US20180322456A1 - Methods of analyzing key entities in a social network - Google Patents

Methods of analyzing key entities in a social network Download PDF

Info

Publication number
US20180322456A1
US20180322456A1 US16/039,146 US201816039146A US2018322456A1 US 20180322456 A1 US20180322456 A1 US 20180322456A1 US 201816039146 A US201816039146 A US 201816039146A US 2018322456 A1 US2018322456 A1 US 2018322456A1
Authority
US
United States
Prior art keywords
entities
network
subgraph
entity
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US16/039,146
Other versions
US10740724B2 (en
Inventor
Daniel Vesely
Anthony M. Page
Ryan Peeler
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LNX RESEARCH LLC
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US12/877,914 external-priority patent/US9195962B2/en
Application filed by Individual filed Critical Individual
Priority to US16/039,146 priority Critical patent/US10740724B2/en
Assigned to LNX RESEARCH, LLC reassignment LNX RESEARCH, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PAGE, ANTHONY M., PEELER, RYAN, VESELY, DANIEL
Publication of US20180322456A1 publication Critical patent/US20180322456A1/en
Application granted granted Critical
Publication of US10740724B2 publication Critical patent/US10740724B2/en
Assigned to MONROE CAPITAL MANAGEMENT ADVISORS, LLC reassignment MONROE CAPITAL MANAGEMENT ADVISORS, LLC SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LNX RESEARCH LLC
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising

Definitions

  • the present invention relates to analysis of social networks for use in marketing.
  • Key entities are individuals or institutions whose opinions or actions are influential. They have the ability to influence the behavior of other entities in the same field or a related field.
  • key opinion leaders, in medicine are generally medical practitioners or researchers relied upon by other practitioners or researchers to provide informative opinions on standard of care, pharmaceuticals, devices, and the importance of various biochemical pathways among other things. These opinions heavily influence the decisions and behaviors of other practitioners and researchers.
  • Key opinion leaders in medicine are often targeted by pharmaceutical and biotechnical companies. Key opinion leaders often provide these companies with marketing feedback and advocacy activity. In addition, key opinion leaders sometimes assist pharmaceutical companies in designing and engaging in clinical trials. Key opinion leaders also spread knowledge throughout the medical community on how and when to properly use a drug or device and provide feedback to the companies from the medical community on their products.
  • Identifying, establishing relationships with, and maintaining relationships with key opinion leaders is time consuming and expensive. It is therefore desirable to efficiently select key opinion leaders which meet the needs of a contacting company. For example, in the field of medicine, it may be more important to select someone who works on a specific subtype of lymphoma as that individual may have more influence over practitioners who deal with patients with that lymphoma subtype. Also, it may be important to choose a key opinion leader who has influence over practitioners practicing in certain geographic regions.
  • a social network is a structure of nodes which generally represent organizations or individuals but can represent other entities.
  • the nodes are connected to one another by links which represent relationships between entities represented by the nodes.
  • a graphic representation of a social network is called a sociogram.
  • Social network analysis is a process of generating information from a social network. Using the techniques of social network analysis, information on social prestige and social position can be obtained for entities or groups of entities in a network. Information on the transport of influence and communication in a network can also be harvested. Visualization of sociograms, for instance, assists in determining barriers to the movement of information or paths by which information is likely to diffuse through.
  • Advanced matrix mathematical methods can be used to obtain numerical variables, called network centrality metrics, which quantitatively indicate characteristics of a node in a network. These characteristics provide insight into the social role of an entity in the network.
  • network centrality metrics include betweeness, Bonacich's power centrality, closeness, degree, and eigenvector centrality, as well as others. Each provides different information on the status, or importance of an entity in a network. Combinations of values for the different centrality measures, for a particular entity, may be used in combination to assess that entities importance, or role in the network.
  • non-centrality metric data for instance a researcher's publication count or an institution's geography may be combined with the centrality metric values to obtain an even clearer picture of the role of an entity in a particular social network.
  • Recent advances in computer technology including improvements in the speed at which data may be acquired from remote sources, through the Internet, and the increased ability of a computer to manipulate large amounts of data within a short period of time have made the acquisition, construction, and analysis of large social networks, using network centrality metrics and other procedures, possible.
  • new text matching software designed for cleaning of large data sets, allows for the accurate analysis of large social networks from which a wealth of diverse, informative data can be constructed.
  • US 2006/0184464 A1 teaches finding individuals in organizations that are key individuals using profiles built from analyzing metadata including relationship data from a dataset. US 2006/0184464 A1 does not teach network centrality metrics or reach or segmentation.
  • US 2004/0073476 A1 teaches a method for obtaining a subgraph of key opinion leaders based upon an automated survey methodology. The method does not teach social network analysis for identifying key entities.
  • US 2002/0169737 A1 discloses an Internet accessible method for displaying relationships between people, organizations, and articles. This application also teaches the concept of “reach” to assess the connectedness of an entity in a network. It does not teach network centrality metrics or segmentation of key entities by network centrality metrics or the use of reach in combination with network centrality metric values to systematically define adequate numbers of key entities in a subgraph of key entities or subgroups of key entities.
  • US 2005/0080655 A1 teaches a method of assessing the quality of collaborative relationships, mentioning the use several different possible approaches including social network analysis (SNA). While reach and centrality metrics are mentioned as possible tools to assess quality of relationships, no systematic method for identifying key entities is presented using reach and centrality measures. The reference does not teach segmentation of key entities by network centrality metrics or the use of reach in combination with network centrality metric values to systematically define adequate numbers of key entities in a subgraph of key entities or subgroups of key entities.
  • SNA social network analysis
  • Disclosed herein are one or more techniques for identifying key entities in a network, building a subgraph, or invisible college, of these key entities, segmenting the subgraph of key entities into specific sub-groups based upon their roles in the network, identifying bridge builders between sub-groups, identifying work-circles of frequently collaborative entities, and identifying institutions which are centers of significance. These techniques may be used as an alternative to the survey method for finding key opinion leaders, which avoids the disadvantages described above.
  • a method for obtaining a subgraph of key entities may comprise determining at least two types of network centrality metrics for all entities in the giant component of the network using statistical computer programs executed by one or more processors. Rank-based scores are then assigned to each network centrality metric value of each entity. Entities are selected to form a tentative subgraph of key entities based on their network centrality metric rank-based scores using preset cut-off criteria.
  • the reach of the entities in the tentative subgraph is calculated, and the reach is compared to a reach range. If the reach falls within the reach range, then the entities in the tentative subgraph are assigned to a subgraph of key entities. If the reach does not fall within the reach range, then a portion of the above process is repeated using alternate rank-based scores cut-off criteria until a subgraph of key entities having a reach within the desired reach range is formed.
  • a method for segmenting a subgraph of key entities of a network into sub-groups based on network centrality metrics includes calculating at least two different network centrality metric values for each entity in the subgraph of key entities using statistical computer program executed by one or more processors.
  • a rank-based score is assigned to each of the network centrality metric values.
  • a plurality of rank-based score ranges are defined for each of the network centrality metrics. For each rank-based score of each entity, it is determined which of the corresponding rank-based score ranges that the rank-based score falls within.
  • Each of the subgraph of key entities is assigned to sub-groups based upon the rank-based score ranges that their rank-based scores fall within.
  • a method for identifying bridge-builders between subgroups may comprise generating a subgraph of key entities in a network, segmenting the subgraph of key entities of a network into subgroups based on network centrality metrics, and identifying entities which span the subgroups, based on the frequency of first and second degree connections between entities.
  • a method for identifying work-circles may comprise computing affinity scores for each fink in the subgraph.
  • the affinity scores are computed based on collaborations between the entities. Subgroups with high degrees of mutual collaboration are then identified starting with the entities with the highest overall affinity scores. This group is then refined to only those entities in the group with highest internal collaboration within the group. After removing the refined group of entities, the process is repeated in the reduced subgraph, and the process is then repeated until no more entities are left. In this way the subgraph is divided into workcircles comprising groups which frequently collaborate.
  • a method for identifying centers of significance may comprise generating a subgraph of key entities in a network, and for each key entity identifying important institutions they are members of.
  • the important institutions are identified by counting the number of key entities and entities who are members, and the number of connections between members of the same institution and between institutions.
  • Institutions can be ranked by a formula based on the number of internal and external connections and the top ranked institutions are considered centers of significance.
  • the present invention includes a method of dividing a subgraph of entities into a plurality of clusters of entities.
  • the method may comprise computing an affinity score for each link in the subgraph, computing a total affinity score for each entity in the subgraph, ranking the entities according to their total affinity scores, selecting a plurality of entities of the highest rank from the subgraph, computing ingroup affinity scores for the entities of the plurality of entities, ranking the entities in the plurality of entities according to their ingroup affinity scores, selecting a cluster of entities from the plurality of entities with the highest ingroup affinity scores, and removing the cluster of entities from the subgraph.
  • the steps can be repeated until every entity in the subgraph has been assigned to one of a plurality of clusters extracted from the network. After removing the cluster of entities from the subgraph, the cluster of entities can be added to a plurality of clusters of entities.
  • FIG. 1 is a flow diagram which depicts an exemplary method of generating a subgraph of key entities in a network.
  • FIG. 2 is a flow diagram which depicts an exemplary method of segmenting a subgraph of key entities of a network into sub-groups based on network centrality metrics.
  • FIG. 3 is a representation of a network of individuals where nodes represent individual persons and links between nodes represent friendships between the nodes.
  • FIG. 4 is an exemplary list containing identifiers for entities in a friendship network, betweeness centrality and eigenvector centrality metric values for these entities, and rank-based scores for each of these entities.
  • FIG. 5 is an exemplary list identifying entities in a subgraph of key entities obtained from the friendship network along with betweeness centrality and eigenvector centrality metric values for these entities, rank-based scores for each of these entities, and a combined reach for these entities.
  • FIG. 6 is an exemplary list identifying entities in a subgraph of key entities obtained from the friendship network along with betweeness centrality and eigenvector centrality metric values for these entities, rank-based scores for each of these entities, and a combined reach for these entities.
  • FIG. 7 is an exemplary list identifying the entities in a subgraph of key entities obtained from a scientific research network.
  • FIG. 8 is an exemplary list identifying the key entities in a subgraph of key entities obtained from a scientific research network along with closeness centrality and eigenvector centrality metric values for these entities, and rank-based scores for each of these entities.
  • FIG. 9 is a figure depicting exemplary subgroups formed by segmentation of a subgraph of key entities using one set of closeness centrality and eigenvector centrality rank based score criteria.
  • FIG. 10 is a figure depicting exemplary subgroups formed by segmentation of a subgraph of key entities using an alternate set of closeness centrality and eigenvector centrality rank based score criteria.
  • FIG. 11 is a conceptual block diagram illustrating certain components of an exemplary system for generating a subgraph of key entities in a network.
  • FIG. 12 is a conceptual block diagram illustrating certain components of an exemplary system for segmenting a subgraph of key entities of a network into sub-groups based on network centrality metrics.
  • FIG. 13 is a conceptual block diagram illustrating the concept of a bridge builder.
  • FIG. 14 is an example flow diagram depicting an example method of identifying bridge builders.
  • FIG. 15 is an example flow diagram of identifying centers of significance and identifying key entities within them.
  • FIG. 16 is an example process flow for the method of dividing the subgraph up into clusters of entities.
  • the techniques described herein are generally aimed towards the analysis of networks to identify and key entities, and to split them into key entity subgroups using social network analysis centrality measures.
  • a first method of the present invention comprises a method of generating a subgraph of key entities in a network, segmenting the subgraph of key entities of a network into subgroups based on network centrality metrics, and identifying entities which span the subgroups.
  • Generating the subgraph comprises determining at least two independent types of network centrality metrics for a plurality of entities in a giant component of the network, selecting starting cut-off criteria for each network centrality metric, assigning a plurality of rank-based scores to each entity, where each rank based score corresponds to each network centrality metric value of each entity selecting some of the entities to form a tentative subgraph of key entities, where the selection of key entities is based on comparisons of the plurality of rank-based scores to the plurality of cut-off criteria, calculating reach of the entities in the tentative subgraph of key entities and comparing the reach to a reach range, adjusting the selection cut-off criteria and iteratively adjusting the subgraph until the reach range is met.
  • the selection process comprises iteratively identifying the entities whose centrality metric score for a network centrality metric exceeds the cut-off criteria, and merging the identified entities into the tentative subgraph, for each network centrality metric. If the reach falls within the reach range, defined as falling above the minimum reach threshold and below the maximum reach threshold, the entities in the tentative sub graph are assigned to the subgraph of key entities, wherein the subgraph of key entities represents a core group of key opinion leaders within a social network. If the reach does not fall within the reach range, one or more of the cut-off criteria for each network centrality metric is adjusted.
  • segmenting the subgraph into subgroups may comprises calculating at least two independent network centrality metric values for each entity in the sub graph of key entities, assigning a plurality of rank-based scores to each entity, where each rank based score corresponds to each network centrality metric value of each entity, defining a plurality of rank-based score ranges for each of the network centrality metrics, defining a plurality of subgroups corresponding to combinations of the rank based score ranges, assigning entities of the sub graph of key entities to one or more subgroups, comprising: for each rank based score range, determining the score range that the entity's rank-based score falls into, for each subgroup, determining if the entity's rank-based scores fall within the score ranges corresponding to the subgroup, assigning the entity to the corresponding subgroup, and if the entity falls within more than one subgroup, optionally removing the entity from one or more of the subgroups.
  • identifying a plurality of entities which span the subgroups may comprise for each entity in each subgroup, determining the shortest path through the network to each entity in each of the other subgroups, resulting in an array of connection paths for each entity, counting the number of first and second degree connections to members of other subgroups each entity has, wherein a first degree connection is a single-link relationship between an entity and another entity in a different subgroup, wherein a second degree connection is a two-link relationship between an entity and another entity in a different subgroup, resulting in a bridging connection count for each entity; and selecting a plurality of entities with the highest bridging connection counts.
  • the present invention features a method of generating a subgraph of key entities in a network, and centers of significance within the network.
  • the method may comprise for each entity in the network, identifying a list of organizations to which the entity belongs, for each entity in the subgraph of key entities, identifying a list of organizations to which the entity belongs, counting the number of entities with a membership in each organization, counting the number of key entities with a membership in each organization, for each organization, counting the number of connections between entities with a membership in the organization, for each organization, counting the number of connections between members and non-members of the organization, ranking the organizations according to a formula based on the number of entities and key entities belonging to the organization, and the number of connections within and outside the organization, selecting a plurality of the highest ranking organizations.
  • Identifying entities which are important within each center of significance comprising: for each entity with a membership in each center of significance: counting the number of connections to other entities with a membership in the center of significance; and counting the number of connections to entities who are not members of the center of significance; ranking the entities according to a formula based on the number of connections within the center of significance and outside the center of significance; and selecting a plurality of entities with the highest rank.
  • the present invention features a method of dividing a subgraph of entities into a plurality of clusters of entities.
  • the method may comprise computing an affinity score for each link in the subgraph, computing a total affinity score for each entity in the subgraph, where the total affinity score of the entity is the sum of the affinity scores of all links connected to the entity, ranking the entities according to their total affinity scores, and selecting a plurality of entities of the highest rank from the subgraph.
  • the method may also include computing ingroup affinity scores for the entities of the plurality of entities comprising, for each entity in the plurality of entities, summing the affinity scores for the links connecting the entity to other entities in the plurality of entities.
  • the method may further comprise ranking the entities in the plurality of entities according to their ingroup affinity scores, selecting a cluster of entities from the plurality of entities with the highest ingroup affinity scores, removing the cluster of entities from the subgraph, and adding the cluster of entities to a plurality of clusters of entities.
  • the steps of computing an affinity score for each link in the subgraph, computing a total affinity score for each entity in the subgraph, ranking the entities according to their total affinity scores, selecting a plurality of entities of the highest rank from the subgraph, computing ingroup affinity scores for the entities, ranking the entities in the plurality of entities according to their ingroup affinity scores, selecting a cluster of entities from the plurality of entities with the highest ingroup affinity scores, and removing the cluster of entities from the subgraph can be repeated until every entity in the subgraph has been assigned to one of a plurality of clusters extracted from the network.
  • the selection of the plurality of entities with the highest rank may comprise selecting a configurable number of the highest ranking entities. In other embodiments, the selection of the plurality of entities with the highest rank may comprise selecting the entities with a total affinity score above a threshold.
  • the selection of the cluster of entities with the highest affinity scores may comprise selecting a configurable number of entities.
  • the selection of the cluster of entities with the highest ingroup affinity may comprise selecting entities with ingroup affinity scores above a threshold.
  • the affinity scores may be computed from a formula including the number of collaborations with other entities, the age of collaborations with other entities, and the frequency of collaboration with other entities.
  • the method of dividing a subgraph of entities into a plurality of clusters of entities may further comprise identifying key entities in each cluster.
  • This step of identifying key entities in each cluster may comprise determining at least two independent types of network centrality metrics for the plurality of entities in the cluster, selecting a cutoff criteria for each metric, assigning a plurality of rank-based scores to each entity, where each rank based score corresponds to each network centrality metric value of each entity, and identifying the entities whose rank-based score exceeds the cut-off criteria for each metric.
  • the method of dividing a subgraph of entities into a plurality of clusters of entities may further comprise identifying key clusters within the network.
  • This step may comprise determining at least two independent types of network centrality metrics for the plurality of clusters in the network, selecting a cutoff criteria for each metric, assigning a plurality of rank-based scores to each cluster, where each rank based score corresponds to each network centrality metric value of each cluster, and identifying the clusters whose rank-based score exceeds the cut-off criteria for each metric.
  • the centrality metrics may comprise a binding affinity, the number of entities in the cluster, and a relevance of the member's metadata.
  • the binding affinity can be a measure of the frequency of collaboration within the cluster.
  • the relevance can refer to the frequency with which the components of the member's metadata appear in a keyword taxonomy, which is a list of keywords associated with a field of interest.
  • the method may further comprise generating a report of members in key clusters with highly relevant expertise. This step of generating the report may comprise for each key cluster, ranking the members according to the relevance of the member's metadata, selecting a cutoff criteria, and selecting a plurality of members according to the cutoff criteria.
  • Other embodiments of the present invention may comprise a method of dividing a network into work circles of entities in the network, wherein each entity has a plurality of associated metadata, wherein a work circle is a plurality of entities with similar metadata, wherein the method comprises: defining a metadata vector, wherein the metadata vector comprises a plurality of data about the entity, populating the metadata vector for each entity in the network, resulting in a set of metadata vectors associated with each entity in the network, resulting in a plurality of metadata vectors, applying a k-means clustering algorithm to the plurality of metadata vectors, resulting in k clusters of metadata vectors with similar values, and identifying the plurality of members associated with each vector in the metadata clusters, wherein the plurality of members associated with a metadata cluster is a work circle.
  • the invention may comprise “fingerprinting” for each person in the network.
  • the fingerprint may comprise a combination of network centrality scores.
  • the fingerprint may comprise metadata.
  • the finger print may be used to identify individuals with similar fingerprints.
  • the invention may be used to recommend introductions or collaborations between similar individuals who have not previously collaborated or with few network links. The following is a non-limiting example of “fingerprinting”. If Person X has measures A, B, C and Person Y also has measures similar to A, B, C, then Person X and Person Y would be recommended to a client who only knew Person X or Person Y previously, Another non-limiting example of “fingerprinting” is through metadata similarity. For instance, if Person X did 50% of his work in area A, 25% in Area B, and 25% in Area C, finding people with similar metadata profiles can help clients to identify alternate people to work with.
  • FIG. 1 is a flow diagram which illustrates an exemplary method for obtaining a subgraph of key entities and dividing the entities into different subgroups based upon network centrality measures possessed by the entities.
  • the method comprises, determining at least two types of network centrality metrics for all entities in the giant component of the network using statistical algorithms executed by a microprocessor or other mechanical processing device ( 101 ); assigning rank-based scores to each network centrality metric value of each entity ( 102 ); selecting entities to form a tentative subgraph of key entities based on their network centrality metric rank-based scores using preset cut-off criteria ( 103 ); calculating the reach of the entities, in the tentative subgraph of key entities ( 104 ), and comparing that reach to a desired reach range ( 105 ); if the reach falls within the reach range then assign the entities in the tentative subgraph of key entities to a subgraph of key entities ( 106 ); if the reach does not fall within the reach range then iteratively repeat the above process using alternate rank-based scores cut-off criteria
  • network entities generally refer to objects represented by a node in a network.
  • an entity is a person, such as a publication author, scientist, inventor political donator, philanthropist, a criminal, a physician, a nurse, a clinical worker, or an infected person.
  • a “subgraph” is used in this document to describe a set of entities from network of entities. Entities which are part of a subgraph and their associated data including metrics can be indicated in a list or graphically displayed as a set of nodes and links or by other means known to those of ordinary skill in the art.
  • the network may be a publication-based network.
  • Publication-based networks are generally networks whose links are defined, at least in part, by publication commonalities. These may include but are not limited to co-citation, shared institution, shared journal, magazine, or newspaper, or co-authorship.
  • This type of information can be obtained, for instance, by searching through journal databases or the Internet and extracting that information either manually or using text mining software from electronic journals or article summaries or other methods known to those of ordinary skill in the art.
  • the entities may be publication authors and links or connections between the entities are based upon co-authorships, co-citations, or email interactions, or other human interactions.
  • human interaction also refers to any social system in which organisms interact with other organisms and their collective co-existence, irrespective of whether the organisms are aware of it or not, and irrespective of whether the interaction is voluntary or involuntary.
  • the connections may also include human-machine-human interactions, where a machine may be an intermediary step between any two humans.
  • Links may be single links or multiple links or non-integer links.
  • Information on email based relationships between entities can be obtained, for instance, from blogs or personal management software, surveys, or other sources known to those of ordinary skill in the art.
  • the entity may be an institution, a topic, such as a protein, a clinic, or a patent.
  • Information on protein networks can be obtained from scientific journals and websites, for example.
  • Information on patents, for example relationships between inventors or assignees, can be obtained from patent databases, for example, An example of where relationships between clinics can be identified, for instance, relationships between clinics defined by joint participation in specific clinical trials, can be obtained from websites, such as www.clinicaltrials.gov.
  • the entities are institutions and links are based upon co-authorships, co-citations, or other cross-intuitional relationships.
  • a good source for information on cross-institutional relationships is the Internet, including institution websites and electronic publications.
  • first-degree links refer to the shortest link path distance between any two nodes. Nodes with a shortest link path of two are two links apart have a second-degree link. Stated differently, the two nodes are separated by another node. Nodes with a shortest link path distance of one are directly connected through a single link, and are considered to be adjacent to each other, i.e., these adjacent nodes are connected by a first-degree link.
  • the reach is the fraction of entities in the giant component which are connected to the entities in the tentative subgraph by first-degree links, second-degree links or a combination thereof.
  • the reach is the fraction of entities in the giant component which are connected to the entities in the tentative subgraph of key entities by first-degree links.
  • network centrality metrics includes measures of centrality used in graph theory and network analysis. These measures indicate the importance of a node in a graph. In graphs where nodes correspond to entities and graphs correspond to collections of entities and their connections, these measures indicate the importance of an entity in a collection of entities.
  • Some exemplary network centrality metrics include degree centrality, betweeness centrality, eigenvector centrality, Bonacich's power centrality, and closeness centrality.
  • Computer programs, such as statistics and/or social networking software, e.g., UCINET or SAS, can be used to calculate these metrics from network adjacency matrices constructed for the networks. A person may also write their own code using, for instance, Java, FORTRAN, or C++.
  • the networks on which the centrality metric computer programs are generally applied are large and consist of many nodes and links. Therefore, execution of these programs, on a reasonable timescale, may be performed by computers.
  • the use of a computer involves the translation of social network analysis algorithms into specific computer program code, which may be reasonably accomplished by those of ordinary skill in the art.
  • the term “giant component” generally refers to the largest group of connected nodes in a graph. It should be understood, however, that there may be multiple sub-graphs in a network and the “giant component” may refer to some or all of these.
  • the reach of the tentative subgraph of the key entities may be calculated following its establishment. If the reach falls below or above a particular reach range, then cutoff-values can be changed to alter the number of the rank-based scores which are acceptable to permit inclusion of an entity into the tentative subgraph of key entities.
  • publication-based statistics generally refers to statistics or variables related to extent of publication, for example publication count, but may also refer to geography of publication, impact factor, or other variables associated with publications, or that can be embedded in or extracted from one or more publications.
  • FIG. 2 is a flow diagram which illustrates an exemplary method of segmenting a subgraph of key entities of a network into sub-groups based on network centrality metrics ( 200 ).
  • the method includes calculating at least two different network centrality metric values ( 201 ), for each entity in the subgraph of key entities using statistical algorithms executed by a microprocessor or other mechanical processing device; assigning a rank-based score to each of the network centrality metric values ( 202 ); defining two or more rank-based score ranges for each of the network centrality metrics ( 203 ); for each rank-based score of each entity determining which of the corresponding rank-based score ranges that the rank-based score falls within; assigning each of the subgraph of key entities to sub-groups based upon the rank-based score ranges that their rank-based scores fall within ( 204 ); and optionally, repeating the above steps ( 205 ) using alternative rank-based score ranges until a desired number of entities is assigned to each sub-group ( 206 ); and contacting one or more of the entities in one or more of the segmented subgraphs, and/or delivering the segmented subgraph to one or more clients ( 207 ).
  • At least three different types of network centrality metrics or, at least two different types of network centrality metrics and at least one publication related variable are used to segment a subgraph of key entities.
  • segmenting refers to dividing entities into subgroups.
  • the entities in particular subgroups share similarities in their network centrality metric values or publication related statistics. For instance, entities with high betweeness centrality scores and low eigenvector centrality scores may be segmented together into a subgroup. In general, the subgroup in which a particular entity is segmented into will indicate something about the role of that entity in the network.
  • the network may be a publication-based network.
  • FIG. 3 depicts a small network ( 300 ) of persons who have relationships with one another defined by survey acknowledged friendship.
  • Icons 301 - 318
  • Friendship is represented by links connecting the eighteen individuals. In this example the links are not weighted, although they may be weighted in other circumstances.
  • the betweeness centrality and eigenvector centrality may be determine for this network and betweeness centrality and associated with each network entity. These values are listed in FIG. 4 , along with their associated rank-based scores. Prior to the calculations, cut-off criteria are set, e.g., it was determined that only persons in the friendship network possessing top 15% betweeness centrality scores or top 15% eigenvector centrality scores would be contacted with the information desired to be communicated across the network. Individuals with high betweeness scores should be able to pass the information between the various disconnected subgroups of friends in the network. Individuals in the high eigenvector scores should be able to pass the information to a large number of other individuals in the network as these individual's possess friendships to popular individuals in the network.
  • the second example illustrates segmentation of a subgraph of key entities using network centrality measures.
  • a subgraph of twenty-three key entities in a scientific research network is present.
  • the subgraph entities are displayed in a list in FIG. 7 .
  • the subgraph of key entities ( 700 ) in this example may or may not have been constructed using network centrality measures.
  • the client's interest is in marketing an expensive computer program to persons in the subgraph of key entities.
  • the entities' names, profiles, and other descriptors have been replaced by numeric identifiers ( 701 - 723 ). In this case, the client would like to place more resources into marketing the product to influential people in the subgraph of key entities with the hope that if they purchase the program, other entities in the scientific research network will be in swayed into also purchasing the program.
  • the entities in the subgraph of key entities are segmented into four different subgroups.
  • Subgroup A includes individuals who are close to the center of the network and possess connections to well-connected entities in the network. These individuals, in general, have high values of eigenvector centrality and closeness centrality, and would likely possess the funding necessary to purchase the program and the influence necessary to sway others in the network to purchase the program.
  • Subgroup B includes individuals who are well connected to well-connected individuals in the network but are not working in the core of the network. These individuals should have high eigenvector centrality values and low closeness centrality values. It can be hypothesized that these individuals may be very influential in a small subset of the research network but are not very influential to the network on a whole because they may be working on an unpopular research topic. It may also be hypothesized that these individuals may or may not have the funding available to purchase the program.
  • Subgroup C includes individuals in the subgraph of key entities who are in the core of the network, perhaps because they work on a very popular research topic, but are not well connected to well-connected people in the network. These individuals should have high values of closeness centrality but not eigenvector centrality. It may be hypothesized that individuals in this subgroup may have a moderate degree of influence on other researchers in the network because they may be working on a very popular research topic and may be publishing in popular journals, but may or may not have enough funding available to purchase the computer program.
  • Subgroup D includes individuals who are not that well connected to well-connected individuals in the network and who are not at the core of the network. These individuals may not have funding to purchase the computer software we are marketing. It is also unlikely that these individuals will be able to influence other members of the network to purchase the software.
  • individuals segmented into Subgroup A have an eigenvector centrality rank that is between 1 and 5 and a closeness centrality rank that is between 1 and 10.
  • Individuals segmented into Subgroup B are individuals not segmented into Subgroup A who have an eigenvector centrality rank score between 1 and 5.
  • Individuals segmented into Subgroup C are individuals not segmented into Subgroup A who have a closeness centrality rank score of between 1 and 10.
  • Subgroup D then contains all of the other entities in the key subgraph of entities.
  • the twenty-three entities are segmented to the four subgroups as indicated in FIG. 9 . There are five entities in Subgroup A, no entities in Subgroup B, five entities in Subgroup C, and thirteen entities in Subgroup D.
  • the rank-based score ranges are then redefined.
  • Subgroup A has an eigenvector centrality rank that is between 1 and 5 and a closeness centrality rank that is between 1 and 5.
  • Individuals segmented into Subgroup B are individuals not segmented into Subgroup A who have an eigenvector centrality rank score between 1 and 10 and whose eigenvector centrality rank score is greater than or equal to their closeness centrality rank score.
  • Individuals segmented into Subgroup C are individuals not segmented into Subgroup A or Subgroup B who have a closeness centrality rank score of between 1 and 10.
  • Subgroup D contains all of the other entities in the subgraph of key entities.
  • FIG. 11 is a conceptual block diagram illustrating certain components of an exemplary system for generating a subgraph of key entities in a network.
  • the system includes a computing device ( 1002 ) having a processor ( 1006 ) and a memory ( 1008 ) in communication with one another.
  • the memory stores a subgraph generation computer program ( 1010 ).
  • the memory ( 1008 ) may also store other programs and/or data.
  • the processor ( 1006 ) includes one or more digital circuits, such as microprocessors, DSPs, embedded controllers, or intellectual property (IP) cores for executing programs stored in the memory ( 1008 ).
  • the memory ( 1008 ) may be any suitable computer storage medium capable of storing instructions and/or data. In some embodiments, the computer storage medium capable is a non-transitory medium.
  • the computing device ( 1002 ) receives data about the network and entities within the network, and in turn, the subgraph generation program ( 1010 ) produces a subgraph of key entities by executing some or all of the method steps described above in connection with FIG. 1 .
  • the subgraph generation program ( 1010 ) includes instructions executable by the processor 1006 for causing the computing device ( 1002 ) to perform some or all of the steps described above in connection with FIG. 1 .
  • FIG. 12 is a conceptual block diagram illustrating certain components of an exemplary system for segmenting a subgraph of key entities of a network into sub-groups based on network centrality metrics.
  • the system includes the computing device ( 1002 ) having the processor ( 1006 ) and the memory ( 1008 ) in communication with one another.
  • the memory ( 1008 ) stores a subgraph segmentation computer program ( 1100 ).
  • FIG. 13 is a conceptual illustration of the role of a bridge-builder entity.
  • a giant component of the network has two subgroups ( 1120 , 1130 ).
  • a bridge builder ( 1140 ) is an entity which has connections two other entities in both subgroups. Identifying bridge-builders is advantageous since bridge builders have reach from one subgroup into another. Bridge builders can be identified by counting the number of first and second-degree connections between entities and different subgroups (subgroups to which the entity does not belong). Bridge builder will be entities that have a large number of first and second degree connections to entities in at least one other subgroup.
  • FIG. 14 illustrates a conceptual flow chart for identifying bridge builders. Initially a subgraph of entities is created ( 1201 ) as in FIG. 1 . Secondly, the subgraph is split into subgroups ( 1202 ) as in FIG. 2 . The path length to each entity from every other entity in the subgroup is computed ( 1203 ). The shortest path between entities in one subgroup to another is then identified, for each sub-group to sub-group pair ( 1204 ). The entities comprising this shortest path are identified as bridge builders ( 1205 ).
  • FIG. 15 illustrates a conceptual flow chart for identifying centers of significance.
  • a subgraph of key entities is identified as in FIG. 1 ( 1301 ).
  • the institutions they belong to are collected ( 1302 ).
  • the number of entities (both key entities and other entities in the giant component of the network) belonging to each institution are counted ( 1303 , 1304 ).
  • the number of connections to other entities with the same institutional membership and to entities with other memberships is counted ( 1305 , 1306 ).
  • This data is used to form rankings of the institution based on the frequency of internal and external connections ( 1307 ).
  • the institutions with the largest number of external and external connections are selected ( 1308 ) according to a formula.
  • the member entities of each center of significance are ranked to determine the top members ( 1309 ) and selected as key entities ( 1310 ).
  • FIG. 16 shows a conceptual process flow for dividing the subgraph ( 1401 ) into clusters of interconnected entities.
  • the affinity scores for each link in the subgraph are computed ( 1402 ).
  • the affinity scores may be computed based on factors including the number of collaborations between entities in the subgraph, the age of collaborations, and the frequency of collaboration among other connections.
  • the affinity scores assign a weight to each link in the graph.
  • the total affinity scores for each entity are then computed by summing all the affinity scores on all of the links ( 1403 ). Thus, people with frequent collaborations with many other entities will tend to have the highest total affinity scores.
  • the top ranking people are then selected ( 1404 ) according to some selection criteria, such as a threshold or a fixed number of the top ranking entities.
  • This subgroup is then refined to the entities within it who collaborate with each other, following a similar process:
  • the in-group affinity scores are then computed by summing only the scores connecting the nodes in the subgroup with other entities in the subgroup ( 1406 ). Then the top scoring entities are determined, again using a threshold or fixed number of entities ( 1407 ).
  • This cluster ( 1410 ) is then extracted from the subgraph ( 1408 ) and added to a plurality of clusters ( 1411 ) which the subgraph is being divided into. The process is then repeated on the remaining subgraph until there are no nodes remaining. In this way, the graph is divided into clusters of frequently collaborating entities.
  • the computing device ( 1002 ) receives data about the network, including data about entities within the network, and in turn, the subgraph segmentation program ( 1100 ) produces one or more subgraph segments by executing some or all of the method steps described above in connection with FIG. 2 . More specifically, the subgraph segmentation program ( 1100 ) includes instructions executable by the processor ( 1006 ) for causing the computing device ( 1002 ) to perform some or all of the steps described above in connection with FIG. 2 .
  • the computing device ( 1002 ) may be configured to store both the subgraph generation and subgraph segmentation programs ( 1010 , 1100 ) in memory ( 1008 ), and that the functions of each program ( 1010 , 1100 ) may be combined into a single program, or that the programs ( 1010 , 1100 ) may be executed together in a cooperative manner.
  • the functionality of the systems, devices, and their respective components, as well as the method steps and blocks described herein may be implemented in hardware, software, firmware, or any suitable combination thereof.
  • the software/firmware may be a program having sets of instructions (e.g., code segments) executable by one or more digital circuits, such as microprocessors, DSPs, embedded controllers, or intellectual property (IP) cores. If implemented in software/firmware, the functions may be stored on or transmitted over as instructions or code on one or more computer-readable media.
  • Computer-readable medium includes both computer storage medium and communication medium, including any medium that facilitates transfer of a computer program from one place to another.
  • a storage medium may be any available medium that can be accessed by a computer.
  • Such computer-readable medium can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
  • Disk and disc includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and Blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable medium.
  • Computers typically include known components, such as a processor, an operating system, system memory, memory storage devices, input-output controllers, input-output devices, and display devices. It will also be understood by those of ordinary skill in the relevant art that there are many possible configurations and components of a computer and may also include cache memory, a data backup unit, and many other devices. Examples of input devices include a keyboard, a cursor control devices (e.g., a mouse), a microphone, a scanner, and so forth. Examples of output devices include a display device (e.g., a monitor or projector), speakers, a printer, a network card, and so forth. Display devices may include display devices that provide visual information, this information typically may be logically and/or physically organized as an array of pixels.
  • An interface controller may also be included that may comprise any of a variety of known or future software programs for providing input and output interfaces.
  • interfaces may include what are generally referred to as “Graphical User Interfaces” (often referred to as GUI's) that provide one or more graphical representations to a user. Interfaces are typically enabled to accept user inputs using means of selection or input known to those of ordinary skill in the related art.
  • the interface may also be a touch screen device.
  • applications on a computer may employ an interface that includes what are referred to as “command line interfaces” (often referred to as CLI's). CLI's typically provide a text based interaction between an application and a user.
  • command line interfaces present output and receive input as lines of text through display devices.
  • some implementations may include what are referred to as a “shell” such as Unix Shells known to those of ordinary skill in the related art, or Microsoft Windows Powershell that employs object-oriented type programming architectures such as the Microsoft .NET framework.
  • shell such as Unix Shells known to those of ordinary skill in the related art
  • Microsoft Windows Powershell that employs object-oriented type programming architectures such as the Microsoft .NET framework.
  • interfaces may include one or more GUI's, CLI's or a combination thereof.
  • a processor may include a commercially available processor such as a Celeron, Core, or Pentium processor made by Intel Corporation, a SPARC processor made by Sun Microsystems, an Athlon, Sempron, Phenom, or Opteron processor made by AMC Corporation, or it may be one of other processors that are or will become available.
  • Some embodiments of a processor may include what is referred to as multi-core processor and/or be enabled to employ parallel processing technology in a single or multi-core configuration.
  • a multi-core architecture typically comprises two or more processor “execution cores”. In the present example, each execution core may perform as an independent processor that enables parallel execution of multiple threads.
  • a processor may be configured in what is generally referred to as 32 or 64 bit architectures, or other architectural configurations now known or that may be developed in the future.
  • a processor typically executes an operating system, which may be, for example, a Windows type operating system from the Microsoft Corporation; the Mac OS X operating system from Apple Computer Corp.; a Unix or Linux-type operating system available from many vendors or what is referred to as an open source; another or a future operating system; or some combination thereof.
  • An operating system interfaces with firmware and hardware in a well-known manner, and facilitates the processor in coordinating and executing the functions of various computer programs that may be written in a variety of programming languages.
  • An operating system typically in cooperation with a processor, coordinates and executes functions of the other components of a computer.
  • An operating system also provides scheduling, input-output control, file and data management, memory management, and communication control and related services, all in accordance with known techniques.
  • System memory may include any of a variety of known or future memory storage devices that can be used to store the desired information and that can be accessed by a computer.
  • Computer readable storage media may include volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules, or other data. Examples include any commonly available random access memory (RAM), read-only memory (ROM), electronically erasable programmable read-only memory (EEPROM), digital versatile disks (DVD), magnetic medium, such as a resident hard disk or tape, an optical medium such as a read and write compact disc, or other memory storage device.
  • RAM random access memory
  • ROM read-only memory
  • EEPROM electronically erasable programmable read-only memory
  • DVD digital versatile disks
  • magnetic medium such as a resident hard disk or tape
  • an optical medium such as a read and write compact disc, or other memory storage device.
  • Memory storage devices may include any of a variety of known or future devices, including a compact disk drive, a tape drive, a removable hard disk drive, USB or flash drive, or a diskette drive. Such types of memory storage devices typically read from, and/or write to, a program storage medium such as, respectively, a compact disk, magnetic tape, removable hard disk, USB or flash drive, or floppy diskette. Any of these program storage media, or others now in use or that may later be developed, may be considered a computer program product. As will be appreciated, these program storage media typically store a computer software program and/or data. Computer software programs, also called computer control logic, typically are stored in system memory and/or the program storage device used in conjunction with memory storage device.
  • a computer program product comprising a computer usable medium having control logic (computer software program, including program code) stored therein.
  • the control logic when executed by a processor, causes the processor to perform functions described herein.
  • some functions are implemented primarily in hardware using, for example, a hardware state machine. Implementation of the hardware state machine so as to perform the functions described herein will be apparent to those skilled in the relevant arts.
  • Input-output controllers could include any of a variety of known devices for accepting and processing information from a user, whether a human or a machine, whether local or remote. Such devices include, for example, modem cards, wireless cards, network interface cards, sound cards, or other types of controllers for any of a variety of known input devices.
  • Output controllers could include controllers for any of a variety of known display devices for presenting information to a user, whether a human or a machine, whether local or remote.
  • the functional elements of a computer communicate with each other via a system bus.
  • Some embodiments of a computer may communicate with some functional elements using network or other types of remote communications.
  • an instrument control and/or a data processing application if implemented in software, may be loaded into and executed from system memory and/or a memory storage device.
  • instrument control and/or data processing applications may also reside in a read-only memory or similar device of the memory storage device, such devices not requiring that the instrument control and/or data processing applications first be loaded through input-output controllers. It will be understood by those skilled in the relevant art that the instrument control and/or data processing applications, or portions of it, may be loaded by a processor, in a known manner into system memory, or cache memory, or both, as advantageous for execution.
  • a computer may include one or more library files, experiment data files, and an internet client stored in system memory.
  • experiment data could include data related to one or more experiments or assays, such as detected signal values, or other values associated with one or more sequencing by synthesis (SBS) experiments or processes.
  • SBS sequencing by synthesis
  • an Internet client may include an application enabled to access a remote service on another computer using a network and may for instance comprise what are generally referred to as “Web Browsers”.
  • some commonly employed web browsers include Microsoft Internet Explorer available from Microsoft Corporation, Mozilla Firefox from the Mozilla Corporation, Safari from Apple Computer Corp., Google Chrome from the Google Corporation, or other type of web browser currently known in the art or to be developed in the future.
  • an internet client may include, or could be an element of, specialized software applications enabled to access remote information via a network such as a data processing application for biological applications.
  • a network may include one or more of the many various types of networks well known to those of ordinary skill in the art.
  • a network may include a local or wide area network that may employ what is commonly referred to as a TCP/IP protocol suite to communicate.
  • a network may include a network comprising a worldwide system of interconnected computer networks that is commonly referred to as the internet, or could also include various intranet architectures.
  • Firewalls also sometimes referred to as Packet Filters, or Border Protection Devices
  • firewalls may comprise hardware or software elements or some combination thereof and are typically designed to enforce security policies put in place by users, such as for instance network administrators, etc.
  • the term “about” refers to plus or minus 10% of the referenced number.

Abstract

Methods of identifying key entities in a network, building a subgraph, or invisible college, of these key entities, segmenting the subgraph of key entities into specific sub-groups based upon their roles in the network, identifying bridge builders between sub-groups, identifying work-circles of frequently collaborative entities, and identifying institutions, which are centers of significance, are disclosed. These techniques can be used as an alternative to the survey method for finding key opinion leaders.

Description

    CROSS REFERENCE
  • This application is a continuation-in-part and claims benefit of U.S. patent application Ser. No. 15/148,952 filed May 6, 2016, which is a continuation-in-part and claims benefit of U.S. patent application Ser. No. 14/949,555 filed Nov. 23, 2015, which is a continuation and claims benefit of U.S. patent application Ser. No. 12/877,914 filed Sep. 8, 2010, now U.S. Pat. No. 9,195,962, which is a non-provisional and claims benefit of U.S. Provisional Patent Application No. 61/241,801 filed Sep. 11, 2009, the specification(s) of which is/are incorporated herein in their entirety by reference.
  • FIELD OF THE INVENTION
  • The present invention relates to analysis of social networks for use in marketing.
  • BACKGROUND OF THE INVENTION
  • Key entities are individuals or institutions whose opinions or actions are influential. They have the ability to influence the behavior of other entities in the same field or a related field. For example, key opinion leaders, in medicine, are generally medical practitioners or researchers relied upon by other practitioners or researchers to provide informative opinions on standard of care, pharmaceuticals, devices, and the importance of various biochemical pathways among other things. These opinions heavily influence the decisions and behaviors of other practitioners and researchers.
  • Key opinion leaders in medicine are often targeted by pharmaceutical and biotechnical companies. Key opinion leaders often provide these companies with marketing feedback and advocacy activity. In addition, key opinion leaders sometimes assist pharmaceutical companies in designing and engaging in clinical trials. Key opinion leaders also spread knowledge throughout the medical community on how and when to properly use a drug or device and provide feedback to the companies from the medical community on their products.
  • Identifying, establishing relationships with, and maintaining relationships with key opinion leaders is time consuming and expensive. It is therefore desirable to efficiently select key opinion leaders which meet the needs of a contacting company. For example, in the field of medicine, it may be more important to select someone who works on a specific subtype of lymphoma as that individual may have more influence over practitioners who deal with patients with that lymphoma subtype. Also, it may be important to choose a key opinion leader who has influence over practitioners practicing in certain geographic regions.
  • The most common current method used to for select key entities, such as key opinion leaders, is by using surveys. This technique has disadvantages. For instance, surveys tend to be very biased. Individuals who receive surveys tend to select their friends or close colleagues as key opinion leaders rather than making an objective selection. This is due to, at least in part, the fact that survey responders are limited to those individuals willing to fill in the survey in exchange for an honoraria, and over time subject matter experts within a domain respond to the surveys with the same answers producing the similar results.
  • Furthermore, the preparation, and interpretation of these surveys can be time consuming. Those who are surveyed generally expect to be monetarily compensated for their time. Moreover, considerable effort may be spent on identifying which persons to send the surveys to. Thus, improved techniques for identifying key entities are needed.
  • A social network is a structure of nodes which generally represent organizations or individuals but can represent other entities. The nodes are connected to one another by links which represent relationships between entities represented by the nodes. A graphic representation of a social network is called a sociogram.
  • Social network analysis is a process of generating information from a social network. Using the techniques of social network analysis, information on social prestige and social position can be obtained for entities or groups of entities in a network. Information on the transport of influence and communication in a network can also be harvested. Visualization of sociograms, for instance, assists in determining barriers to the movement of information or paths by which information is likely to diffuse through.
  • Advanced matrix mathematical methods can be used to obtain numerical variables, called network centrality metrics, which quantitatively indicate characteristics of a node in a network. These characteristics provide insight into the social role of an entity in the network. There are several different types of network centrality metrics, including betweeness, Bonacich's power centrality, closeness, degree, and eigenvector centrality, as well as others. Each provides different information on the status, or importance of an entity in a network. Combinations of values for the different centrality measures, for a particular entity, may be used in combination to assess that entities importance, or role in the network. In addition, non-centrality metric data, for instance a researcher's publication count or an institution's geography may be combined with the centrality metric values to obtain an even clearer picture of the role of an entity in a particular social network.
  • Recent advances in computer technology, including improvements in the speed at which data may be acquired from remote sources, through the Internet, and the increased ability of a computer to manipulate large amounts of data within a short period of time have made the acquisition, construction, and analysis of large social networks, using network centrality metrics and other procedures, possible. In addition, new text matching software, designed for cleaning of large data sets, allows for the accurate analysis of large social networks from which a wealth of diverse, informative data can be constructed.
  • Methods for identifying key entities based on network and/or relationship properties have been described previously. For example, U.S. Patent Application Publication 2007/0271272 A1 teaches using connections in a personal-communications network to identify opinion leaders, where connections may be defined by the quantity of times a person's name is searched in a search engine. The method does not, however, teach segmentation of key entities using network centrality measures or the use of reach in combination with network centrality measures to systematically define adequate numbers of key entities in a subgraph of key entities or subgroups of key entities.
  • US 2006/0184464 A1 teaches finding individuals in organizations that are key individuals using profiles built from analyzing metadata including relationship data from a dataset. US 2006/0184464 A1 does not teach network centrality metrics or reach or segmentation.
  • US 2004/0073476 A1 teaches a method for obtaining a subgraph of key opinion leaders based upon an automated survey methodology. The method does not teach social network analysis for identifying key entities.
  • US 2002/0169737 A1 discloses an Internet accessible method for displaying relationships between people, organizations, and articles. This application also teaches the concept of “reach” to assess the connectedness of an entity in a network. It does not teach network centrality metrics or segmentation of key entities by network centrality metrics or the use of reach in combination with network centrality metric values to systematically define adequate numbers of key entities in a subgraph of key entities or subgroups of key entities.
  • US 2005/0080655 A1 teaches a method of assessing the quality of collaborative relationships, mentioning the use several different possible approaches including social network analysis (SNA). While reach and centrality metrics are mentioned as possible tools to assess quality of relationships, no systematic method for identifying key entities is presented using reach and centrality measures. The reference does not teach segmentation of key entities by network centrality metrics or the use of reach in combination with network centrality metric values to systematically define adequate numbers of key entities in a subgraph of key entities or subgroups of key entities.
  • SUMMARY OF THE INVENTION
  • Disclosed herein are one or more techniques for identifying key entities in a network, building a subgraph, or invisible college, of these key entities, segmenting the subgraph of key entities into specific sub-groups based upon their roles in the network, identifying bridge builders between sub-groups, identifying work-circles of frequently collaborative entities, and identifying institutions which are centers of significance. These techniques may be used as an alternative to the survey method for finding key opinion leaders, which avoids the disadvantages described above.
  • In accordance with one aspect, a method for obtaining a subgraph of key entities is provided. The method may comprise determining at least two types of network centrality metrics for all entities in the giant component of the network using statistical computer programs executed by one or more processors. Rank-based scores are then assigned to each network centrality metric value of each entity. Entities are selected to form a tentative subgraph of key entities based on their network centrality metric rank-based scores using preset cut-off criteria. The reach of the entities in the tentative subgraph is calculated, and the reach is compared to a reach range. If the reach falls within the reach range, then the entities in the tentative subgraph are assigned to a subgraph of key entities. If the reach does not fall within the reach range, then a portion of the above process is repeated using alternate rank-based scores cut-off criteria until a subgraph of key entities having a reach within the desired reach range is formed.
  • In accordance with another aspect, a method for segmenting a subgraph of key entities of a network into sub-groups based on network centrality metrics is provided. The method includes calculating at least two different network centrality metric values for each entity in the subgraph of key entities using statistical computer program executed by one or more processors. A rank-based score is assigned to each of the network centrality metric values. A plurality of rank-based score ranges are defined for each of the network centrality metrics. For each rank-based score of each entity, it is determined which of the corresponding rank-based score ranges that the rank-based score falls within. Each of the subgraph of key entities is assigned to sub-groups based upon the rank-based score ranges that their rank-based scores fall within.
  • In accordance with some aspects, a method for identifying bridge-builders between subgroups is provided. The method may comprise generating a subgraph of key entities in a network, segmenting the subgraph of key entities of a network into subgroups based on network centrality metrics, and identifying entities which span the subgroups, based on the frequency of first and second degree connections between entities.
  • In accordance with other aspects, a method for identifying work-circles is provided. The method may comprise computing affinity scores for each fink in the subgraph. In some embodiments, the affinity scores are computed based on collaborations between the entities. Subgroups with high degrees of mutual collaboration are then identified starting with the entities with the highest overall affinity scores. This group is then refined to only those entities in the group with highest internal collaboration within the group. After removing the refined group of entities, the process is repeated in the reduced subgraph, and the process is then repeated until no more entities are left. In this way the subgraph is divided into workcircles comprising groups which frequently collaborate.
  • In accordance with another aspect, a method for identifying centers of significance is provided. The method may comprise generating a subgraph of key entities in a network, and for each key entity identifying important institutions they are members of. The important institutions are identified by counting the number of key entities and entities who are members, and the number of connections between members of the same institution and between institutions. Institutions can be ranked by a formula based on the number of internal and external connections and the top ranked institutions are considered centers of significance.
  • According to additional aspects, the present invention includes a method of dividing a subgraph of entities into a plurality of clusters of entities. The method may comprise computing an affinity score for each link in the subgraph, computing a total affinity score for each entity in the subgraph, ranking the entities according to their total affinity scores, selecting a plurality of entities of the highest rank from the subgraph, computing ingroup affinity scores for the entities of the plurality of entities, ranking the entities in the plurality of entities according to their ingroup affinity scores, selecting a cluster of entities from the plurality of entities with the highest ingroup affinity scores, and removing the cluster of entities from the subgraph. The steps can be repeated until every entity in the subgraph has been assigned to one of a plurality of clusters extracted from the network. After removing the cluster of entities from the subgraph, the cluster of entities can be added to a plurality of clusters of entities.
  • Other aspects, features, advantages and variations of the methods, systems, articles of manufacture and techniques disclosed herein will be or will become apparent to one with skill in the art upon examination of the following figures and detailed description. It is intended that all such additional aspects, features, variations and advantages be included within this description and be protected by the accompanying claims.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a flow diagram which depicts an exemplary method of generating a subgraph of key entities in a network.
  • FIG. 2 is a flow diagram which depicts an exemplary method of segmenting a subgraph of key entities of a network into sub-groups based on network centrality metrics.
  • FIG. 3 is a representation of a network of individuals where nodes represent individual persons and links between nodes represent friendships between the nodes.
  • FIG. 4 is an exemplary list containing identifiers for entities in a friendship network, betweeness centrality and eigenvector centrality metric values for these entities, and rank-based scores for each of these entities.
  • FIG. 5 is an exemplary list identifying entities in a subgraph of key entities obtained from the friendship network along with betweeness centrality and eigenvector centrality metric values for these entities, rank-based scores for each of these entities, and a combined reach for these entities.
  • FIG. 6 is an exemplary list identifying entities in a subgraph of key entities obtained from the friendship network along with betweeness centrality and eigenvector centrality metric values for these entities, rank-based scores for each of these entities, and a combined reach for these entities.
  • FIG. 7 is an exemplary list identifying the entities in a subgraph of key entities obtained from a scientific research network.
  • FIG. 8 is an exemplary list identifying the key entities in a subgraph of key entities obtained from a scientific research network along with closeness centrality and eigenvector centrality metric values for these entities, and rank-based scores for each of these entities.
  • FIG. 9 is a figure depicting exemplary subgroups formed by segmentation of a subgraph of key entities using one set of closeness centrality and eigenvector centrality rank based score criteria.
  • FIG. 10 is a figure depicting exemplary subgroups formed by segmentation of a subgraph of key entities using an alternate set of closeness centrality and eigenvector centrality rank based score criteria.
  • FIG. 11 is a conceptual block diagram illustrating certain components of an exemplary system for generating a subgraph of key entities in a network.
  • FIG. 12 is a conceptual block diagram illustrating certain components of an exemplary system for segmenting a subgraph of key entities of a network into sub-groups based on network centrality metrics.
  • FIG. 13 is a conceptual block diagram illustrating the concept of a bridge builder.
  • FIG. 14 is an example flow diagram depicting an example method of identifying bridge builders.
  • FIG. 15 is an example flow diagram of identifying centers of significance and identifying key entities within them.
  • FIG. 16 is an example process flow for the method of dividing the subgraph up into clusters of entities.
  • DESCRIPTION OF PREFERRED EMBODIMENTS
  • The following detailed description, which references to and incorporates the drawings, describes and illustrates one or more specific embodiments of what is claimed. These embodiments, offered not to limit but only to exemplify and teach the invention, are shown and described in sufficient detail to enable those skilled in the art to practice the invention defined by the claims. Thus, where appropriate to avoid obscuring the invention, the description may omit certain information known to those of skill in the art.
  • The word “exemplary” is used throughout this disclosure to mean “serving as an example, instance, or illustration.” Any embodiment or feature described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other embodiments or features.
  • The techniques described herein are generally aimed towards the analysis of networks to identify and key entities, and to split them into key entity subgroups using social network analysis centrality measures.
  • According to some embodiments, in a non-transitory computer-readable medium, a first method of the present invention comprises a method of generating a subgraph of key entities in a network, segmenting the subgraph of key entities of a network into subgroups based on network centrality metrics, and identifying entities which span the subgroups. Generating the subgraph comprises determining at least two independent types of network centrality metrics for a plurality of entities in a giant component of the network, selecting starting cut-off criteria for each network centrality metric, assigning a plurality of rank-based scores to each entity, where each rank based score corresponds to each network centrality metric value of each entity selecting some of the entities to form a tentative subgraph of key entities, where the selection of key entities is based on comparisons of the plurality of rank-based scores to the plurality of cut-off criteria, calculating reach of the entities in the tentative subgraph of key entities and comparing the reach to a reach range, adjusting the selection cut-off criteria and iteratively adjusting the subgraph until the reach range is met. The selection process comprises iteratively identifying the entities whose centrality metric score for a network centrality metric exceeds the cut-off criteria, and merging the identified entities into the tentative subgraph, for each network centrality metric. If the reach falls within the reach range, defined as falling above the minimum reach threshold and below the maximum reach threshold, the entities in the tentative sub graph are assigned to the subgraph of key entities, wherein the subgraph of key entities represents a core group of key opinion leaders within a social network. If the reach does not fall within the reach range, one or more of the cut-off criteria for each network centrality metric is adjusted.
  • In a primary embodiment, segmenting the subgraph into subgroups may comprises calculating at least two independent network centrality metric values for each entity in the sub graph of key entities, assigning a plurality of rank-based scores to each entity, where each rank based score corresponds to each network centrality metric value of each entity, defining a plurality of rank-based score ranges for each of the network centrality metrics, defining a plurality of subgroups corresponding to combinations of the rank based score ranges, assigning entities of the sub graph of key entities to one or more subgroups, comprising: for each rank based score range, determining the score range that the entity's rank-based score falls into, for each subgroup, determining if the entity's rank-based scores fall within the score ranges corresponding to the subgroup, assigning the entity to the corresponding subgroup, and if the entity falls within more than one subgroup, optionally removing the entity from one or more of the subgroups.
  • In a primary embodiment, identifying a plurality of entities which span the subgroups may comprise for each entity in each subgroup, determining the shortest path through the network to each entity in each of the other subgroups, resulting in an array of connection paths for each entity, counting the number of first and second degree connections to members of other subgroups each entity has, wherein a first degree connection is a single-link relationship between an entity and another entity in a different subgroup, wherein a second degree connection is a two-link relationship between an entity and another entity in a different subgroup, resulting in a bridging connection count for each entity; and selecting a plurality of entities with the highest bridging connection counts.
  • According to other embodiments, in a non-transitory computer-readable medium, the present invention features a method of generating a subgraph of key entities in a network, and centers of significance within the network. The method may comprise for each entity in the network, identifying a list of organizations to which the entity belongs, for each entity in the subgraph of key entities, identifying a list of organizations to which the entity belongs, counting the number of entities with a membership in each organization, counting the number of key entities with a membership in each organization, for each organization, counting the number of connections between entities with a membership in the organization, for each organization, counting the number of connections between members and non-members of the organization, ranking the organizations according to a formula based on the number of entities and key entities belonging to the organization, and the number of connections within and outside the organization, selecting a plurality of the highest ranking organizations. Identifying entities which are important within each center of significance, comprising: for each entity with a membership in each center of significance: counting the number of connections to other entities with a membership in the center of significance; and counting the number of connections to entities who are not members of the center of significance; ranking the entities according to a formula based on the number of connections within the center of significance and outside the center of significance; and selecting a plurality of entities with the highest rank.
  • According to some embodiments, in a non-transitory computer-readable medium, the present invention features a method of dividing a subgraph of entities into a plurality of clusters of entities. The method may comprise computing an affinity score for each link in the subgraph, computing a total affinity score for each entity in the subgraph, where the total affinity score of the entity is the sum of the affinity scores of all links connected to the entity, ranking the entities according to their total affinity scores, and selecting a plurality of entities of the highest rank from the subgraph. The method may also include computing ingroup affinity scores for the entities of the plurality of entities comprising, for each entity in the plurality of entities, summing the affinity scores for the links connecting the entity to other entities in the plurality of entities. The method may further comprise ranking the entities in the plurality of entities according to their ingroup affinity scores, selecting a cluster of entities from the plurality of entities with the highest ingroup affinity scores, removing the cluster of entities from the subgraph, and adding the cluster of entities to a plurality of clusters of entities.
  • In some embodiments, the steps of computing an affinity score for each link in the subgraph, computing a total affinity score for each entity in the subgraph, ranking the entities according to their total affinity scores, selecting a plurality of entities of the highest rank from the subgraph, computing ingroup affinity scores for the entities, ranking the entities in the plurality of entities according to their ingroup affinity scores, selecting a cluster of entities from the plurality of entities with the highest ingroup affinity scores, and removing the cluster of entities from the subgraph can be repeated until every entity in the subgraph has been assigned to one of a plurality of clusters extracted from the network.
  • In some embodiments, the selection of the plurality of entities with the highest rank may comprise selecting a configurable number of the highest ranking entities. In other embodiments, the selection of the plurality of entities with the highest rank may comprise selecting the entities with a total affinity score above a threshold.
  • In one embodiment, the selection of the cluster of entities with the highest affinity scores may comprise selecting a configurable number of entities. In another embodiment, the selection of the cluster of entities with the highest ingroup affinity may comprise selecting entities with ingroup affinity scores above a threshold. In some embodiments, the affinity scores may be computed from a formula including the number of collaborations with other entities, the age of collaborations with other entities, and the frequency of collaboration with other entities.
  • According to one embodiment, the method of dividing a subgraph of entities into a plurality of clusters of entities may further comprise identifying key entities in each cluster. This step of identifying key entities in each cluster may comprise determining at least two independent types of network centrality metrics for the plurality of entities in the cluster, selecting a cutoff criteria for each metric, assigning a plurality of rank-based scores to each entity, where each rank based score corresponds to each network centrality metric value of each entity, and identifying the entities whose rank-based score exceeds the cut-off criteria for each metric.
  • According to one embodiment, the method of dividing a subgraph of entities into a plurality of clusters of entities may further comprise identifying key clusters within the network. This step may comprise determining at least two independent types of network centrality metrics for the plurality of clusters in the network, selecting a cutoff criteria for each metric, assigning a plurality of rank-based scores to each cluster, where each rank based score corresponds to each network centrality metric value of each cluster, and identifying the clusters whose rank-based score exceeds the cut-off criteria for each metric.
  • In some embodiments, the centrality metrics may comprise a binding affinity, the number of entities in the cluster, and a relevance of the member's metadata. The binding affinity can be a measure of the frequency of collaboration within the cluster. The relevance can refer to the frequency with which the components of the member's metadata appear in a keyword taxonomy, which is a list of keywords associated with a field of interest.
  • According to some embodiments, the method may further comprise generating a report of members in key clusters with highly relevant expertise. This step of generating the report may comprise for each key cluster, ranking the members according to the relevance of the member's metadata, selecting a cutoff criteria, and selecting a plurality of members according to the cutoff criteria.
  • Other embodiments of the present invention may comprise a method of dividing a network into work circles of entities in the network, wherein each entity has a plurality of associated metadata, wherein a work circle is a plurality of entities with similar metadata, wherein the method comprises: defining a metadata vector, wherein the metadata vector comprises a plurality of data about the entity, populating the metadata vector for each entity in the network, resulting in a set of metadata vectors associated with each entity in the network, resulting in a plurality of metadata vectors, applying a k-means clustering algorithm to the plurality of metadata vectors, resulting in k clusters of metadata vectors with similar values, and identifying the plurality of members associated with each vector in the metadata clusters, wherein the plurality of members associated with a metadata cluster is a work circle.
  • In an alternative embodiment, the invention may comprise “fingerprinting” for each person in the network. In some embodiments, the fingerprint may comprise a combination of network centrality scores. In an alternative embodiment, the fingerprint may comprise metadata. In some embodiments, the finger print may be used to identify individuals with similar fingerprints. In some embodiments, the invention may be used to recommend introductions or collaborations between similar individuals who have not previously collaborated or with few network links. The following is a non-limiting example of “fingerprinting”. If Person X has measures A, B, C and Person Y also has measures similar to A, B, C, then Person X and Person Y would be recommended to a client who only knew Person X or Person Y previously, Another non-limiting example of “fingerprinting” is through metadata similarity. For instance, if Person X did 50% of his work in area A, 25% in Area B, and 25% in Area C, finding people with similar metadata profiles can help clients to identify alternate people to work with.
  • FIG. 1 is a flow diagram which illustrates an exemplary method for obtaining a subgraph of key entities and dividing the entities into different subgroups based upon network centrality measures possessed by the entities. The method comprises, determining at least two types of network centrality metrics for all entities in the giant component of the network using statistical algorithms executed by a microprocessor or other mechanical processing device (101); assigning rank-based scores to each network centrality metric value of each entity (102); selecting entities to form a tentative subgraph of key entities based on their network centrality metric rank-based scores using preset cut-off criteria (103); calculating the reach of the entities, in the tentative subgraph of key entities (104), and comparing that reach to a desired reach range (105); if the reach falls within the reach range then assign the entities in the tentative subgraph of key entities to a subgraph of key entities (106); if the reach does not fall within the reach range then iteratively repeat the above process using alternate rank-based scores cut-off criteria (107), until a subgraph of key entities with a reach within the desired reach range is formed; optionally filtering entities from the subgraph of key entities using publication-based statistics (108); and contacting one or more of the entities in the subgraph, and/or delivering the subgraph to one or more clients (109).
  • The term “network entities” or “entities” generally refer to objects represented by a node in a network. In some instances, an entity is a person, such as a publication author, scientist, inventor political donator, philanthropist, a criminal, a physician, a nurse, a clinical worker, or an infected person.
  • A “subgraph” is used in this document to describe a set of entities from network of entities. Entities which are part of a subgraph and their associated data including metrics can be indicated in a list or graphically displayed as a set of nodes and links or by other means known to those of ordinary skill in the art.
  • The network may be a publication-based network. Publication-based networks are generally networks whose links are defined, at least in part, by publication commonalities. These may include but are not limited to co-citation, shared institution, shared journal, magazine, or newspaper, or co-authorship.
  • This type of information can be obtained, for instance, by searching through journal databases or the Internet and extracting that information either manually or using text mining software from electronic journals or article summaries or other methods known to those of ordinary skill in the art.
  • In some circumstances, the entities may be publication authors and links or connections between the entities are based upon co-authorships, co-citations, or email interactions, or other human interactions. In addition to its ordinary meaning, human interaction also refers to any social system in which organisms interact with other organisms and their collective co-existence, irrespective of whether the organisms are aware of it or not, and irrespective of whether the interaction is voluntary or involuntary. The connections may also include human-machine-human interactions, where a machine may be an intermediary step between any two humans. Links may be single links or multiple links or non-integer links. Information on email based relationships between entities can be obtained, for instance, from blogs or personal management software, surveys, or other sources known to those of ordinary skill in the art.
  • In other circumstances, the entity may be an institution, a topic, such as a protein, a clinic, or a patent. Information on protein networks can be obtained from scientific journals and websites, for example. Information on patents, for example relationships between inventors or assignees, can be obtained from patent databases, for example, An example of where relationships between clinics can be identified, for instance, relationships between clinics defined by joint participation in specific clinical trials, can be obtained from websites, such as www.clinicaltrials.gov.
  • In another example, the entities are institutions and links are based upon co-authorships, co-citations, or other cross-intuitional relationships. A good source for information on cross-institutional relationships is the Internet, including institution websites and electronic publications.
  • The term “reach” is generally defined as the fraction or amount of entities in a network or subcomponent of a network which are connected to another entity or a group of entities in the network. Reach can be measured in a number of ways including by first-degree links, second-degree links, or higher order links. First-degree or second-degree links refer to the shortest link path distance between any two nodes. Nodes with a shortest link path of two are two links apart have a second-degree link. Stated differently, the two nodes are separated by another node. Nodes with a shortest link path distance of one are directly connected through a single link, and are considered to be adjacent to each other, i.e., these adjacent nodes are connected by a first-degree link.
  • In one example, the reach is the fraction of entities in the giant component which are connected to the entities in the tentative subgraph by first-degree links, second-degree links or a combination thereof.
  • In another example, the reach is the fraction of entities in the giant component which are connected to the entities in the tentative subgraph of key entities by first-degree links.
  • The term “network centrality metrics” includes measures of centrality used in graph theory and network analysis. These measures indicate the importance of a node in a graph. In graphs where nodes correspond to entities and graphs correspond to collections of entities and their connections, these measures indicate the importance of an entity in a collection of entities. Some exemplary network centrality metrics include degree centrality, betweeness centrality, eigenvector centrality, Bonacich's power centrality, and closeness centrality. Computer programs, such as statistics and/or social networking software, e.g., UCINET or SAS, can be used to calculate these metrics from network adjacency matrices constructed for the networks. A person may also write their own code using, for instance, Java, FORTRAN, or C++.
  • The networks on which the centrality metric computer programs are generally applied are large and consist of many nodes and links. Therefore, execution of these programs, on a reasonable timescale, may be performed by computers. The use of a computer involves the translation of social network analysis algorithms into specific computer program code, which may be reasonably accomplished by those of ordinary skill in the art.
  • The term “giant component” generally refers to the largest group of connected nodes in a graph. It should be understood, however, that there may be multiple sub-graphs in a network and the “giant component” may refer to some or all of these.
  • The reach of the tentative subgraph of the key entities may be calculated following its establishment. If the reach falls below or above a particular reach range, then cutoff-values can be changed to alter the number of the rank-based scores which are acceptable to permit inclusion of an entity into the tentative subgraph of key entities.
  • The term “publication-based statistics” generally refers to statistics or variables related to extent of publication, for example publication count, but may also refer to geography of publication, impact factor, or other variables associated with publications, or that can be embedded in or extracted from one or more publications.
  • FIG. 2 is a flow diagram which illustrates an exemplary method of segmenting a subgraph of key entities of a network into sub-groups based on network centrality metrics (200).
  • The method includes calculating at least two different network centrality metric values (201), for each entity in the subgraph of key entities using statistical algorithms executed by a microprocessor or other mechanical processing device; assigning a rank-based score to each of the network centrality metric values (202); defining two or more rank-based score ranges for each of the network centrality metrics (203); for each rank-based score of each entity determining which of the corresponding rank-based score ranges that the rank-based score falls within; assigning each of the subgraph of key entities to sub-groups based upon the rank-based score ranges that their rank-based scores fall within (204); and optionally, repeating the above steps (205) using alternative rank-based score ranges until a desired number of entities is assigned to each sub-group (206); and contacting one or more of the entities in one or more of the segmented subgraphs, and/or delivering the segmented subgraph to one or more clients (207).
  • In at least one embodiment of the invention at least three different types of network centrality metrics or, at least two different types of network centrality metrics and at least one publication related variable are used to segment a subgraph of key entities.
  • The term “segmenting” refers to dividing entities into subgroups. The entities in particular subgroups share similarities in their network centrality metric values or publication related statistics. For instance, entities with high betweeness centrality scores and low eigenvector centrality scores may be segmented together into a subgroup. In general, the subgroup in which a particular entity is segmented into will indicate something about the role of that entity in the network. The network may be a publication-based network.
  • Example 1
  • FIG. 3 depicts a small network (300) of persons who have relationships with one another defined by survey acknowledged friendship. In this example, we seek to identify a few key persons in the network to communicate information to in order to efficiently spread that information over most of the network. Icons (301-318) represent eighteen persons in the network. Friendship is represented by links connecting the eighteen individuals. In this example the links are not weighted, although they may be weighted in other circumstances.
  • The betweeness centrality and eigenvector centrality may be determine for this network and betweeness centrality and associated with each network entity. These values are listed in FIG. 4, along with their associated rank-based scores. Prior to the calculations, cut-off criteria are set, e.g., it was determined that only persons in the friendship network possessing top 15% betweeness centrality scores or top 15% eigenvector centrality scores would be contacted with the information desired to be communicated across the network. Individuals with high betweeness scores should be able to pass the information between the various disconnected subgroups of friends in the network. Individuals in the high eigenvector scores should be able to pass the information to a large number of other individuals in the network as these individual's possess friendships to popular individuals in the network.
  • As 15% of eighteen is about three, the three individuals within the network possessing top 15% betweeness centrality scores (e.g., icons 118, 115, and 113) were selected; and the three individuals within the network possessing the top 15% eigenvector centrality scores ( icons 118, 113, and 117) were selected. Obviously, there is overlap between the selected groups of entities. When merged to form a tentative subgraph of key entities there are four unique entities ( icons 118, 117, 113, and 115). The reach of these entities in the friendship network was then calculated using first-degree links and found to be 72%. That is, these four individuals, possessed first-degree connections to 72% of the network. These data are displayed in a list in FIG. 5.
  • In some situations, it may be desirable to communicate the piece of information to a higher percentage of individuals in the friendship network a larger reach than 72%. In order to achieve a higher reach it was deemed necessary to alter the permissible rank-based betweeness centrality and eigenvector centrality score ranges to top 22% rather than top 15%. The expanded ranges allow for the inclusion of two additional entities (icons 105 and 106) into the tentative subgraph of key entities. This subgraph now includes a total of six entities ( icons 118, 117, 113, 115, 105, and 106). These entities have combined reach of 83%. These data are displayed in a list in FIG. 6. It was determined that this was an acceptable reach and the tentative subgraph of key entities can now be considered a subgraph of key entities. The subgraph of key entities was then delivered to the client as an email attachment.
  • Example 2
  • The second example illustrates segmentation of a subgraph of key entities using network centrality measures. In this example, a subgraph of twenty-three key entities in a scientific research network is present. The subgraph entities are displayed in a list in FIG. 7. It should be noted that the subgraph of key entities (700) in this example may or may not have been constructed using network centrality measures. In this example, the client's interest is in marketing an expensive computer program to persons in the subgraph of key entities. Note also that the entities' names, profiles, and other descriptors have been replaced by numeric identifiers (701-723). In this case, the client would like to place more resources into marketing the product to influential people in the subgraph of key entities with the hope that if they purchase the program, other entities in the scientific research network will be in swayed into also purchasing the program.
  • The entities in the subgraph of key entities are segmented into four different subgroups.
  • Subgroup A includes individuals who are close to the center of the network and possess connections to well-connected entities in the network. These individuals, in general, have high values of eigenvector centrality and closeness centrality, and would likely possess the funding necessary to purchase the program and the influence necessary to sway others in the network to purchase the program.
  • Subgroup B includes individuals who are well connected to well-connected individuals in the network but are not working in the core of the network. These individuals should have high eigenvector centrality values and low closeness centrality values. It can be hypothesized that these individuals may be very influential in a small subset of the research network but are not very influential to the network on a whole because they may be working on an unpopular research topic. It may also be hypothesized that these individuals may or may not have the funding available to purchase the program.
  • Subgroup C includes individuals in the subgraph of key entities who are in the core of the network, perhaps because they work on a very popular research topic, but are not well connected to well-connected people in the network. These individuals should have high values of closeness centrality but not eigenvector centrality. It may be hypothesized that individuals in this subgroup may have a moderate degree of influence on other researchers in the network because they may be working on a very popular research topic and may be publishing in popular journals, but may or may not have enough funding available to purchase the computer program.
  • Subgroup D includes individuals who are not that well connected to well-connected individuals in the network and who are not at the core of the network. These individuals may not have funding to purchase the computer software we are marketing. It is also unlikely that these individuals will be able to influence other members of the network to purchase the software.
  • From an adjacency matrix containing relationship data for the entire network, eigenvector and closeness centrality metric values are calculated. The values are then ranked for individuals in the subgraph of key entities. The network centrality values and rank scores are appended to the subgraph of key entities and that table is shown in FIG. 8.
  • In this example, individuals segmented into Subgroup A have an eigenvector centrality rank that is between 1 and 5 and a closeness centrality rank that is between 1 and 10. Individuals segmented into Subgroup B are individuals not segmented into Subgroup A who have an eigenvector centrality rank score between 1 and 5. Individuals segmented into Subgroup C are individuals not segmented into Subgroup A who have a closeness centrality rank score of between 1 and 10. Subgroup D then contains all of the other entities in the key subgraph of entities.
  • As a result of these rank score criteria, the twenty-three entities are segmented to the four subgroups as indicated in FIG. 9. There are five entities in Subgroup A, no entities in Subgroup B, five entities in Subgroup C, and thirteen entities in Subgroup D.
  • To allow for more entities to be included into Subgroup B, the rank-based score ranges are then redefined.
  • The new ranges are as follows: Subgroup A has an eigenvector centrality rank that is between 1 and 5 and a closeness centrality rank that is between 1 and 5. Individuals segmented into Subgroup B are individuals not segmented into Subgroup A who have an eigenvector centrality rank score between 1 and 10 and whose eigenvector centrality rank score is greater than or equal to their closeness centrality rank score. Individuals segmented into Subgroup C are individuals not segmented into Subgroup A or Subgroup B who have a closeness centrality rank score of between 1 and 10. Subgroup D, as in the previous scheme, contains all of the other entities in the subgraph of key entities.
  • With these revised rank score criteria, the twenty-three entities were again segmented into the four subgroups as indicated in FIG. 10. There are four entities in Subgroup A, four entities in Subgroup B, two entities in Subgroup C, and thirteen entities in Subgroup D. It was decided that this segmentation gave an adequate number of entities in each subgroup and the subgroups should be retained. Several entities in the segmented subgraph were then contacted, by phone to deliver a marketing message to them.
  • FIG. 11 is a conceptual block diagram illustrating certain components of an exemplary system for generating a subgraph of key entities in a network. The system includes a computing device (1002) having a processor (1006) and a memory (1008) in communication with one another. Among other things, the memory stores a subgraph generation computer program (1010). The memory (1008) may also store other programs and/or data. The processor (1006) includes one or more digital circuits, such as microprocessors, DSPs, embedded controllers, or intellectual property (IP) cores for executing programs stored in the memory (1008). The memory (1008) may be any suitable computer storage medium capable of storing instructions and/or data. In some embodiments, the computer storage medium capable is a non-transitory medium.
  • The computing device (1002) receives data about the network and entities within the network, and in turn, the subgraph generation program (1010) produces a subgraph of key entities by executing some or all of the method steps described above in connection with FIG. 1. Specifically, the subgraph generation program (1010) includes instructions executable by the processor 1006 for causing the computing device (1002) to perform some or all of the steps described above in connection with FIG. 1.
  • FIG. 12 is a conceptual block diagram illustrating certain components of an exemplary system for segmenting a subgraph of key entities of a network into sub-groups based on network centrality metrics. The system includes the computing device (1002) having the processor (1006) and the memory (1008) in communication with one another. Among other things, the memory (1008) stores a subgraph segmentation computer program (1100).
  • FIG. 13 is a conceptual illustration of the role of a bridge-builder entity. A giant component of the network has two subgroups (1120, 1130). A bridge builder (1140) is an entity which has connections two other entities in both subgroups. Identifying bridge-builders is advantageous since bridge builders have reach from one subgroup into another. Bridge builders can be identified by counting the number of first and second-degree connections between entities and different subgroups (subgroups to which the entity does not belong). Bridge builder will be entities that have a large number of first and second degree connections to entities in at least one other subgroup.
  • FIG. 14 illustrates a conceptual flow chart for identifying bridge builders. Initially a subgraph of entities is created (1201) as in FIG. 1. Secondly, the subgraph is split into subgroups (1202) as in FIG. 2. The path length to each entity from every other entity in the subgroup is computed (1203). The shortest path between entities in one subgroup to another is then identified, for each sub-group to sub-group pair (1204). The entities comprising this shortest path are identified as bridge builders (1205).
  • FIG. 15 illustrates a conceptual flow chart for identifying centers of significance. First a subgraph of key entities is identified as in FIG. 1 (1301). Once the key entities are obtained, the institutions they belong to are collected (1302). The number of entities (both key entities and other entities in the giant component of the network) belonging to each institution are counted (1303, 1304). For each entity, the number of connections to other entities with the same institutional membership and to entities with other memberships is counted (1305, 1306). This data is used to form rankings of the institution based on the frequency of internal and external connections (1307). The institutions with the largest number of external and external connections are selected (1308) according to a formula. Finally, the member entities of each center of significance are ranked to determine the top members (1309) and selected as key entities (1310).
  • FIG. 16 shows a conceptual process flow for dividing the subgraph (1401) into clusters of interconnected entities. First the affinity scores for each link in the subgraph are computed (1402). The affinity scores may be computed based on factors including the number of collaborations between entities in the subgraph, the age of collaborations, and the frequency of collaboration among other connections. The affinity scores assign a weight to each link in the graph. The total affinity scores for each entity are then computed by summing all the affinity scores on all of the links (1403). Thus, people with frequent collaborations with many other entities will tend to have the highest total affinity scores. The top ranking people are then selected (1404) according to some selection criteria, such as a threshold or a fixed number of the top ranking entities. This subgroup is then refined to the entities within it who collaborate with each other, following a similar process: The in-group affinity scores are then computed by summing only the scores connecting the nodes in the subgroup with other entities in the subgroup (1406). Then the top scoring entities are determined, again using a threshold or fixed number of entities (1407). This cluster (1410) is then extracted from the subgraph (1408) and added to a plurality of clusters (1411) which the subgraph is being divided into. The process is then repeated on the remaining subgraph until there are no nodes remaining. In this way, the graph is divided into clusters of frequently collaborating entities.
  • The computing device (1002) receives data about the network, including data about entities within the network, and in turn, the subgraph segmentation program (1100) produces one or more subgraph segments by executing some or all of the method steps described above in connection with FIG. 2. More specifically, the subgraph segmentation program (1100) includes instructions executable by the processor (1006) for causing the computing device (1002) to perform some or all of the steps described above in connection with FIG. 2.
  • It is noted that the computing device (1002) may be configured to store both the subgraph generation and subgraph segmentation programs (1010, 1100) in memory (1008), and that the functions of each program (1010, 1100) may be combined into a single program, or that the programs (1010, 1100) may be executed together in a cooperative manner.
  • The functionality of the systems, devices, and their respective components, as well as the method steps and blocks described herein may be implemented in hardware, software, firmware, or any suitable combination thereof. The software/firmware may be a program having sets of instructions (e.g., code segments) executable by one or more digital circuits, such as microprocessors, DSPs, embedded controllers, or intellectual property (IP) cores. If implemented in software/firmware, the functions may be stored on or transmitted over as instructions or code on one or more computer-readable media. Computer-readable medium includes both computer storage medium and communication medium, including any medium that facilitates transfer of a computer program from one place to another. A storage medium may be any available medium that can be accessed by a computer. By way of example, and not limitation, such computer-readable medium can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Disk and disc, as used herein, includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and Blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable medium.
  • Computers typically include known components, such as a processor, an operating system, system memory, memory storage devices, input-output controllers, input-output devices, and display devices. It will also be understood by those of ordinary skill in the relevant art that there are many possible configurations and components of a computer and may also include cache memory, a data backup unit, and many other devices. Examples of input devices include a keyboard, a cursor control devices (e.g., a mouse), a microphone, a scanner, and so forth. Examples of output devices include a display device (e.g., a monitor or projector), speakers, a printer, a network card, and so forth. Display devices may include display devices that provide visual information, this information typically may be logically and/or physically organized as an array of pixels. An interface controller may also be included that may comprise any of a variety of known or future software programs for providing input and output interfaces. For example, interfaces may include what are generally referred to as “Graphical User Interfaces” (often referred to as GUI's) that provide one or more graphical representations to a user. Interfaces are typically enabled to accept user inputs using means of selection or input known to those of ordinary skill in the related art. The interface may also be a touch screen device. In the same or alternative embodiments, applications on a computer may employ an interface that includes what are referred to as “command line interfaces” (often referred to as CLI's). CLI's typically provide a text based interaction between an application and a user. Typically, command line interfaces present output and receive input as lines of text through display devices. For example, some implementations may include what are referred to as a “shell” such as Unix Shells known to those of ordinary skill in the related art, or Microsoft Windows Powershell that employs object-oriented type programming architectures such as the Microsoft .NET framework. Those of ordinary skill in the related art will appreciate that interfaces may include one or more GUI's, CLI's or a combination thereof.
  • A processor may include a commercially available processor such as a Celeron, Core, or Pentium processor made by Intel Corporation, a SPARC processor made by Sun Microsystems, an Athlon, Sempron, Phenom, or Opteron processor made by AMC Corporation, or it may be one of other processors that are or will become available. Some embodiments of a processor may include what is referred to as multi-core processor and/or be enabled to employ parallel processing technology in a single or multi-core configuration. For example, a multi-core architecture typically comprises two or more processor “execution cores”. In the present example, each execution core may perform as an independent processor that enables parallel execution of multiple threads. In addition, those of ordinary skill in the related will appreciate that a processor may be configured in what is generally referred to as 32 or 64 bit architectures, or other architectural configurations now known or that may be developed in the future.
  • A processor typically executes an operating system, which may be, for example, a Windows type operating system from the Microsoft Corporation; the Mac OS X operating system from Apple Computer Corp.; a Unix or Linux-type operating system available from many vendors or what is referred to as an open source; another or a future operating system; or some combination thereof. An operating system interfaces with firmware and hardware in a well-known manner, and facilitates the processor in coordinating and executing the functions of various computer programs that may be written in a variety of programming languages. An operating system, typically in cooperation with a processor, coordinates and executes functions of the other components of a computer. An operating system also provides scheduling, input-output control, file and data management, memory management, and communication control and related services, all in accordance with known techniques.
  • System memory may include any of a variety of known or future memory storage devices that can be used to store the desired information and that can be accessed by a computer. Computer readable storage media may include volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules, or other data. Examples include any commonly available random access memory (RAM), read-only memory (ROM), electronically erasable programmable read-only memory (EEPROM), digital versatile disks (DVD), magnetic medium, such as a resident hard disk or tape, an optical medium such as a read and write compact disc, or other memory storage device. Memory storage devices may include any of a variety of known or future devices, including a compact disk drive, a tape drive, a removable hard disk drive, USB or flash drive, or a diskette drive. Such types of memory storage devices typically read from, and/or write to, a program storage medium such as, respectively, a compact disk, magnetic tape, removable hard disk, USB or flash drive, or floppy diskette. Any of these program storage media, or others now in use or that may later be developed, may be considered a computer program product. As will be appreciated, these program storage media typically store a computer software program and/or data. Computer software programs, also called computer control logic, typically are stored in system memory and/or the program storage device used in conjunction with memory storage device. In some embodiments, a computer program product is described comprising a computer usable medium having control logic (computer software program, including program code) stored therein. The control logic, when executed by a processor, causes the processor to perform functions described herein. In other embodiments, some functions are implemented primarily in hardware using, for example, a hardware state machine. Implementation of the hardware state machine so as to perform the functions described herein will be apparent to those skilled in the relevant arts. Input-output controllers could include any of a variety of known devices for accepting and processing information from a user, whether a human or a machine, whether local or remote. Such devices include, for example, modem cards, wireless cards, network interface cards, sound cards, or other types of controllers for any of a variety of known input devices. Output controllers could include controllers for any of a variety of known display devices for presenting information to a user, whether a human or a machine, whether local or remote. In the presently described embodiment, the functional elements of a computer communicate with each other via a system bus. Some embodiments of a computer may communicate with some functional elements using network or other types of remote communications. As will be evident to those skilled in the relevant art, an instrument control and/or a data processing application, if implemented in software, may be loaded into and executed from system memory and/or a memory storage device. All or portions of the instrument control and/or data processing applications may also reside in a read-only memory or similar device of the memory storage device, such devices not requiring that the instrument control and/or data processing applications first be loaded through input-output controllers. It will be understood by those skilled in the relevant art that the instrument control and/or data processing applications, or portions of it, may be loaded by a processor, in a known manner into system memory, or cache memory, or both, as advantageous for execution. Also, a computer may include one or more library files, experiment data files, and an internet client stored in system memory. For example, experiment data could include data related to one or more experiments or assays, such as detected signal values, or other values associated with one or more sequencing by synthesis (SBS) experiments or processes. Additionally, an Internet client may include an application enabled to access a remote service on another computer using a network and may for instance comprise what are generally referred to as “Web Browsers”. In the present example, some commonly employed web browsers include Microsoft Internet Explorer available from Microsoft Corporation, Mozilla Firefox from the Mozilla Corporation, Safari from Apple Computer Corp., Google Chrome from the Google Corporation, or other type of web browser currently known in the art or to be developed in the future. Also, in the same or other embodiments an internet client may include, or could be an element of, specialized software applications enabled to access remote information via a network such as a data processing application for biological applications.
  • A network may include one or more of the many various types of networks well known to those of ordinary skill in the art. For example, a network may include a local or wide area network that may employ what is commonly referred to as a TCP/IP protocol suite to communicate. A network may include a network comprising a worldwide system of interconnected computer networks that is commonly referred to as the internet, or could also include various intranet architectures. Those of ordinary skill in the related arts will also appreciate that some users in networked environments may prefer to employ what are generally referred to as “firewalls” (also sometimes referred to as Packet Filters, or Border Protection Devices) to control information traffic to and from hardware and/or software systems. For example, firewalls may comprise hardware or software elements or some combination thereof and are typically designed to enforce security policies put in place by users, such as for instance network administrators, etc.
  • As used herein, the term “about” refers to plus or minus 10% of the referenced number.
  • Various modifications of the invention, in addition to those described herein, will be apparent to those skilled in the art from the foregoing description. Such modifications are also intended to fall within the scope of the appended claims. Each reference cited in the present application is incorporated herein by reference in its entirety.
  • Although there has been shown and described the preferred embodiment of the present invention, it will be readily apparent to those skilled in the art that modifications may be made thereto which do not exceed the scope of the appended claims. Therefore, the scope of the invention is only to be limited by the following claims. In some embodiments, the figures presented in this patent application are drawn to scale, including the angles, ratios of dimensions, etc. In some embodiments, the figures are representative only and the claims are not limited by the dimensions of the figures. In some embodiments, descriptions of the inventions described herein using the phrase “comprising” includes embodiments that could be described as “consisting of”, and as such the written description requirement for claiming one or more embodiments of the present invention using the phrase “consisting of” is met.
  • The reference numbers recited in the below claims are solely for ease of examination of this patent application, and are exemplary, and are not intended in any way to limit the scope of the claims to the particular features having the corresponding reference numbers in the drawings.

Claims (12)

What is claimed is:
1. In a non-transitory computer-readable medium, a method of generating a subgraph of key entities in a network, segmenting the subgraph of key entities of a network into subgroups based on network centrality metrics, and identifying entities which span the subgroups, the method comprising:
a. generating the subgraph of key entities, comprising:
i. determining, by executing at least one computer program on one or more processors to determine at least two independent types of network centrality metrics for a plurality of entities in a giant component of the network;
ii. selecting starting cut-off criteria for each network centrality metric;
iii. assigning a plurality of rank-based scores to each entity, where each rank based score corresponds to each network centrality metric value of each entity;
iv. selecting some of the entities to form a tentative subgraph of key entities, wherein a subgraph of key entities is defined as a social network graph of a group of entities within the giant component of the network, where the selection of key entities is based on comparisons of the plurality of rank-based scores to the plurality of cut-off criteria, the selection process comprising:
1. identifying the entities whose centrality metric score for a network centrality metric exceeds the cut-off criteria;
2. merging the identified entities into the tentative subgraph; and
3. iteratively repeating steps 1 and 2 of the selection process for each network centrality metric;
v. calculating reach of the entities in the tentative subgraph of key entities and comparing the reach to a reach range, wherein the reach is defined a the fraction of entities in the giant component which are connected to the entities in the tentative subgraph by first-degree links, second-degree links or a combination thereof; wherein the first-degree and second-degree links are based upon co-authorships, co-citations, cross-institutional relationships, or a combination thereof, and where the reach range is defined by a minimum and a maximum reach threshold;
vi. if the reach falls within the reach range, defined as falling above the minimum reach threshold and below the maximum reach threshold, assigning the entities in the tentative sub graph of key entities to the subgraph of key entities, wherein the subgraph of key entities represents a core group of key opinion leaders within a social network;
vii. if the reach does not fall within the reach range, independently adjusting one or more of the cut-off criteria for each network centrality metric; and
viii. iteratively repeating steps iii-vii of the generating the subgraph of key entities until the subgraph of key entities with a reach within the reach range is formed;
b. segmenting the subgraph into subgroups, comprising:
i. calculating, by executing at least one computer program on one or more processors to calculate at least two independent network centrality metric values for each entity in the sub graph of key entities, wherein the network centrality metrics quantitatively indicate independent characteristics of an entity in the network;
ii. assigning a plurality of rank-based scores to each entity, where each rank based score corresponds to each network centrality metric value of each entity;
iii. defining a plurality of rank-based score ranges for each of the network centrality metrics;
iv. defining a plurality of subgroups corresponding to combinations of the rank based score ranges;
v. assigning each entity of the sub graph of key entities to one or more subgroups, comprising:
1. for each rank based score range, determining the score range that the entity's rank-based score falls into;
2. for each subgroup, determining if the entity's rank-based scores fall within the score ranges corresponding to the subgroup;
3. assigning the entity to the corresponding subgroup; and
4. if the entity falls within more than one subgroup, optionally removing the entity from one or more of the subgroups; and
vi. repeating steps iii-v of the segmenting the subgraph into subgroups until a predetermined number of entities is assigned to each subgroup; and
c. identifying a plurality of entities which span the subgroups, comprising:
i. for each entity in each subgroup, determining the shortest path through the network to each entity in each of the other subgroups, resulting in an array of connection paths for each entity;
ii. counting the number of first and second degree connections to members of other subgroups each entity has, wherein a first degree connection is a single-link relationship between an entity and another entity in a different subgroup, wherein a second degree connection is a two-link relationship between an entity and another entity in a different subgroup, resulting in a bridging connection count for each entity; and
iii. selecting a plurality of entities with the highest bridging connection counts.
2. In a non-transitory computer-readable medium, a method of generating a subgraph of key entities in a network, and centers of significance within the network, the method comprising:
a. generating the subgraph of key entities, comprising:
i. determining, by executing at least one computer program on one or more processors to determine at least two independent types of network centrality metrics for a plurality of entities in a giant component of the network;
ii. selecting starting cut-off criteria for each network centrality metric;
iii. assigning a plurality of rank-based scores to each entity, where each rank based score corresponds to each network centrality metric value of each entity;
iv. selecting some of the entities to form a tentative subgraph of key entities, wherein a sub graph of key entities is defined as a social network graph of a group of entities within the giant component of the network, where the selection of key entities is based on comparisons of the plurality of rank-based scores to the plurality of cut-off criteria, the selection process comprising:
1. identifying the entities whose centrality metric score for a network centrality metric exceeds the cut-off criteria;
2. merging the identified entities into the tentative sub graph; and
3. iteratively repeating steps 1 and 2 of the selection process for each network centrality metric;
v. calculating reach of the entities in the tentative sub graph of key entities and comparing the reach to a reach range, wherein the reach is defined as the fraction of entities in the giant component which are connected to the entities in the tentative subgraph by first-degree links, second-degree links or a combination thereof, wherein the first-degree and second-degree links are based upon co-authorships, co-citations, cross-institutional relationships, or a combination thereof, and where the reach range is defined by a minimum and a maximum reach threshold;
vi. if the reach falls within the reach range, defined as falling above the minimum reach threshold and below the maximum reach threshold, assigning the entities in the tentative sub graph of key entities to the subgraph of key entities, wherein the subgraph of key entities represents a core group of key opinion leaders within a social network;
vii. if the reach does not fall within the reach range, independently adjusting one or more of the cut-off criteria for each network centrality metric; and
viii. iteratively repeating steps iii-vii of the generating the subgraph of key entities until the subgraph of key entities with a reach within the reach range is formed;
b. identifying centers of significance within a network, wherein a center of significance is an organization with a high degree of influence, comprising:
i. for each entity in the network, identifying a list of organizations to which the entity belongs;
ii. for each entity in the subgraph of key entities, identifying a list of organizations to which the entity belongs;
iii. counting the number of entities with a membership in each organization;
iv. counting the number of key entities with a membership in each organization;
v. for each organization, counting the number of connections between entities with a membership in the organization;
vi. for each organization, counting the number of connections between members and non-members of the organization;
vii. ranking the organizations according to a formula based on the number of entities and key entities belonging to the organization, and the number of connections within and outside the organization; and
viii. selecting a plurality of the highest ranking organizations; and
c. identifying entities which are important within each center of significance, comprising:
i. for each entity with a membership in each center of significance:
1. counting the number of connections to other entities with a membership in the center of significance; and
2. counting the number of connections to entities who are not members of the center of significance;
ii. ranking the entities according to a formula based on the number of connections within the center of significance and outside the center of significance; and
iii. selecting a plurality of entities with the highest rank.
3. In a non-transitory computer-readable medium, a method of dividing a subgraph (1401) of entities into a plurality of clusters of entities (1411), wherein the method comprises:
a. computing an affinity score for each link in the subgraph (1402);
b. computing a total affinity score for each entity in the subgraph (1403), wherein the total affinity score of the entity is the sum of the affinity scores of all links connected to the entity;
c. ranking the entities according to their total affinity scores;
d. selecting a plurality of entities of the highest rank from the subgraph (1404);
e. computing ingroup affinity scores for the entities of the plurality of entities (1406), comprising, for each entity in the plurality of entities, summing the affinity scores for the links connecting the entity to other entities in the plurality of entities;
f. ranking the entities in the plurality of entities according to their ingroup affinity scores;
g. selecting a cluster of entities from the plurality of entities with the highest ingroup affinity scores (1407);
h. removing the cluster of entities (1410) from the subgraph (1408);
i. adding the cluster of entities to a plurality of clusters of entities (1411); and
j. repeating steps (a) through (h) until every entity in the subgraph has been assigned to one of a plurality of clusters extracted from the network.
4. The method of claim 3, wherein the selection of the plurality of entities with the highest rank comprises selecting a configurable number of the highest ranking entities.
5. The method of claim 3, wherein the selection of the plurality of entities with the highest rank comprises selecting the entities with a total affinity score above a threshold.
6. The method of claim 3, wherein the selection of the cluster of entities with the highest affinity scores comprises selecting a configurable number of entities.
7. The method of claim 3, wherein the selection of the cluster of entities with the highest ingroup affinity comprises selecting entities with ingroup affinity scores above a threshold.
8. The method of claim 3, wherein the affinity scores are computed from a formula including the number of collaborations with other entities, the age of collaborations with other entities, and the frequency of collaboration with other entities.
9. The method of claim 3, wherein the method further comprises identifying key entities in each cluster, comprising:
a. determining at least two independent types of network centrality metrics for the plurality of entities in the cluster;
b. selecting a cutoff criteria for each metric;
c. assigning a plurality of rank-based scores to each entity, where each rank based score corresponds to each network centrality metric value of each entity; and
d. identifying the entities whose rank-based score exceeds the cut-off criteria for each metric.
10. The method of claim 3, wherein the method further comprises identifying key clusters within the network, comprising:
a. determining at least two independent types of network centrality metrics for the plurality of clusters in the network;
b. selecting a cutoff criteria for each metric;
c. assigning a plurality of rank-based scores to each cluster, where each rank based score corresponds to each network centrality metric value of each cluster; and
d. identifying the clusters whose rank-based score exceeds the cut-off criteria for each metric.
11. The method of claim 10, wherein the centrality metrics comprise:
a. a binding affinity, wherein the binding affinity is a measure of the frequency of collaboration within the cluster;
b. the number of entities in the cluster; and
c. a relevance of the member's metadata, wherein relevance refers to the frequency with which the components of the member's metadata appear in a keyword taxonomy, wherein the keyword taxonomy is a list of keywords associated with a field of interest.
12. The method of claim 10, further comprising generating a report of members in key clusters with highly relevant expertise, comprising:
a. for each key cluster, ranking the members according to the relevance of the member's metadata;
b. selecting a cutoff criteria; and
c. selecting a plurality of members according to the cutoff criteria.
US16/039,146 2009-09-11 2018-07-18 Methods of analyzing key entities in a social network Active 2031-04-13 US10740724B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/039,146 US10740724B2 (en) 2009-09-11 2018-07-18 Methods of analyzing key entities in a social network

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US24180109P 2009-09-11 2009-09-11
US12/877,914 US9195962B2 (en) 2009-09-11 2010-09-08 Generating a subgraph of key entities in a network and categorizing the subgraph entities into different types using social network analysis
US201514949555A 2015-11-23 2015-11-23
US201615148952A 2016-05-06 2016-05-06
US16/039,146 US10740724B2 (en) 2009-09-11 2018-07-18 Methods of analyzing key entities in a social network

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US201615148952A Continuation-In-Part 2009-09-11 2016-05-06

Publications (2)

Publication Number Publication Date
US20180322456A1 true US20180322456A1 (en) 2018-11-08
US10740724B2 US10740724B2 (en) 2020-08-11

Family

ID=64014804

Family Applications (1)

Application Number Title Priority Date Filing Date
US16/039,146 Active 2031-04-13 US10740724B2 (en) 2009-09-11 2018-07-18 Methods of analyzing key entities in a social network

Country Status (1)

Country Link
US (1) US10740724B2 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112950046A (en) * 2021-03-18 2021-06-11 广东电网有限责任公司电力调度控制中心 Identification method for key units and units in electric power market
US11108882B2 (en) * 2019-12-09 2021-08-31 Bank Of America Corporation System for assessing and enhancing role defining parameters associated with access to resources in a network
US11418526B2 (en) 2019-12-20 2022-08-16 Microsoft Technology Licensing, Llc Detecting anomalous network activity
US11556636B2 (en) * 2020-06-30 2023-01-17 Microsoft Technology Licensing, Llc Malicious enterprise behavior detection tool
US11949701B2 (en) 2021-08-04 2024-04-02 Microsoft Technology Licensing, Llc Network access anomaly detection via graph embedding

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005107405A2 (en) 2004-05-04 2005-11-17 Boston Consulting Group, Inc. Method and apparatus for selecting, analyzing and visualizing related database records as a network
US7941339B2 (en) 2004-12-23 2011-05-10 International Business Machines Corporation Method and system for managing customer network value
US20070067271A1 (en) 2005-09-22 2007-03-22 Larry Lu Facilitating user interaction through cross-promotion of digital assets
US7856411B2 (en) * 2006-03-21 2010-12-21 21St Century Technologies, Inc. Social network aware pattern detection
US20070288602A1 (en) 2006-06-09 2007-12-13 Ebay Inc. Interest-based communities
EP2057799B1 (en) 2006-08-28 2010-03-31 Telefonaktiebolaget LM Ericsson (PUBL) Method and arrangement for allocating usable sub-carriers to physical resource blocks in a mobile telecommunications system
US8620996B2 (en) 2007-11-19 2013-12-31 Motorola Mobility Llc Method and apparatus for determining a group preference in a social network
US20110004501A1 (en) 2009-07-02 2011-01-06 Pradhan Shekhar S Methods and Apparatus for Automatically Generating Social Events
WO2011031790A1 (en) 2009-09-11 2011-03-17 Topham Philip S Generating a subgraph of key entities in a network and categorizing the subgraph entities into different types

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11108882B2 (en) * 2019-12-09 2021-08-31 Bank Of America Corporation System for assessing and enhancing role defining parameters associated with access to resources in a network
US11418526B2 (en) 2019-12-20 2022-08-16 Microsoft Technology Licensing, Llc Detecting anomalous network activity
US11556636B2 (en) * 2020-06-30 2023-01-17 Microsoft Technology Licensing, Llc Malicious enterprise behavior detection tool
US20230129144A1 (en) * 2020-06-30 2023-04-27 Microsoft Technology Licensing, Llc Malicious enterprise behavior detection tool
CN112950046A (en) * 2021-03-18 2021-06-11 广东电网有限责任公司电力调度控制中心 Identification method for key units and units in electric power market
US11949701B2 (en) 2021-08-04 2024-04-02 Microsoft Technology Licensing, Llc Network access anomaly detection via graph embedding

Also Published As

Publication number Publication date
US10740724B2 (en) 2020-08-11

Similar Documents

Publication Publication Date Title
US10740724B2 (en) Methods of analyzing key entities in a social network
US9195962B2 (en) Generating a subgraph of key entities in a network and categorizing the subgraph entities into different types using social network analysis
US10019442B2 (en) Method and system for peer detection
Moosavi et al. Community detection in social networks using user frequent pattern mining
US20110252121A1 (en) Recommendation ranking system with distrust
US20140280224A1 (en) Systems and Methods for Recommending Relationships within a Graph Database
Xu et al. Scholar-friend recommendation in online academic communities: An approach based on heterogeneous network
WO2014039898A2 (en) Human workflow aware recommendation engine
Kumar et al. HPRA: Hyperedge prediction using resource allocation
Lung et al. Game theory and extremal optimization for community detection in complex dynamic networks
Amjad et al. Indexing of authors according to their domain of expertise
Zhao et al. Embedding-based recommender system for job to candidate matching on scale
Abdrabo et al. Enhancing big data value using knowledge discovery techniques
Burton et al. Discovering social circles in directed graphs
Yao et al. Mapping longitudinal scientific progress, collaboration and impact of the Alzheimer’s disease neuroimaging initiative
Shirgahi et al. Trust estimation of the semantic web using semantic web clustering
Mani et al. Hybrid Filtering-based Physician Recommender Systems using Fuzzy Analytic Hierarchy Process and User Ratings
Perer et al. The longitudinal use of SaNDVis: visual social network analytics in the enterprise
Stankova et al. Classification over bipartite graphs through projection
Hackl et al. Clinical information systems research in the pandemic year 2020
Kaya et al. Evaluating reliability of question-disease relations in online health forms: A link prediction approach
Desai et al. Anatomising the impact of ResearchGate followers and followings on influence identification
Ribas et al. Random walks on the reputation graph
Strayer et al. Interactive network-based clustering and investigation of multimorbidity association matrices with associationSubgraphs
Nasution et al. Social network extraction based on Web: 4. A framework

Legal Events

Date Code Title Description
FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

AS Assignment

Owner name: LNX RESEARCH, LLC, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:VESELY, DANIEL;PAGE, ANTHONY M.;PEELER, RYAN;REEL/FRAME:047096/0996

Effective date: 20180831

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: MONROE CAPITAL MANAGEMENT ADVISORS, LLC, ILLINOIS

Free format text: SECURITY INTEREST;ASSIGNOR:LNX RESEARCH LLC;REEL/FRAME:060426/0682

Effective date: 20220701

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment: 4